Monday, March 17, 2008
Let us assume you want to make a file of size 10000kb
Convert it to bytes -> 10000*1024 which comes out to be 10240000 bytes
Open calculator (win key+r -> type in calc )
Choose view mode to be Scientific one
Type in 10240000 and convert it to hex it comes out to be 9C4000
Convert this value to 8 digits by padding zeroes to its left -> so finally it comes out be 009C4000
Open Command Prompt (win key + r -> type in cmd )
Type DEBUG filename.dat
it'll show file not found error ,ignore it
Type RCX -> Enter -> then last four hexadecimal numbers i.e. 4000 ->Enter
Type RBX -> Enter -> then first four hexadecimal numbers i.e. 009C->Enter
Type W ->Enter
Type Q ->Enter
W stands for write and Q for quit
Now check the file you just made by dir command ->dir filename.dat
Using the same technique you can make files as big as you want
Here is an image to show how exactly everything can be done
UNLOCK PASSWORD PROTECTED MEMORY CARD
Please note the fact that it only works if the password to the MMC Card was set in ur own mobile,where u want it to be unlocked.
This method works well for nokia cells with symbian operating system.Never tried on other cells.use any software like FXplorer that can browse files in ur cell.
1. Open one of above software you have.
2. Browse through the directory, C:\system
3. Rename the file mmcstore to mmcstore.txt
4. Open the file - The file will open in Notes.
5. You will find your password in that file. That file would also contain much more data which you do not understand,so you need to go through the file to get the password!
When ur cell is connected to pc by means of data cable or bluetooth,u can see the password by simply opening the file mmcstore with notepad.
How to Extend Time Limits on Free trial Softwares
Get it Free forever Kaspersky Anti-Hacker
Get it Free with System Mechanic Pro
Smart Protector Pro 15 day free trial then 39.90
Get It Free forever All you have to do is set your clock to some date in the distant future using adjust/date/time in Windows, download your free trial software, run the program once and rollback your time setting to the current date. After you’ve run the program for the first time, the Windows registry will be loaded with a Free Trial Key reflecting an expiration date that you’ve predetermined, and your good to go. Another roundabout way to do this after a trial has already expired would be to bring up the Registry Editor in Windows, find the trial key and delete it. Then download the program again and start the free trial period over. This is pretty easy to do, but if you’re using alot of free trials you may find it to be a hassle editing registers and downloading programs over again everytime one expires. Its much easier to simply adjust your date/time to 2009 or something, download your free trials, rollback to the current date and enjoy them for the next 3 years or so hassle free. By the way I’ve found that when doing this I’m still able to get the notifications when updated versions come along, and download them with no problem. The above screenshots are just 3 examples of the many programs that I’ve been doing this with for an extended time. If your the geek type, manipulating the dates in the registers will also work. Do some experimenting and see what you can find, there are tons of possibilities, and this is something you can have alot of fun with.
Using Gmail account to monitor and handle all your separate email accounts
So what do we need as solution?
A single mail account where all the mail from multiple email accounts are forwarded, in which mail messages can be filtered in separate labels and mail messages can be replied from the email address it was sent to
Solution:-
1. 1 Gmail account
2. Multiple Gmail or hosted domain accounts which can be forwarded to your mail Gmail account
3. Mail forwarding and "Accounts" feature within Gmail
4. Creating labels in Gmail based on "Email Account" that the message comes from
Using three simple steps you can manage all from email accounts from a single account and use the base account as a email backup account for the respective email addresses.
The exact steps are detailed on Google Tutor Post.
Google hacking
Now Google being so intelligent search engine, hackers don’t mind exploiting its ability to dig much confidential and secret information from the net which they are not supposed to know. Now I shall discuss those techniques in details how hackers dig information from the net using Google and how that information can be used to break into remote servers.
Index Of
Using “Index of ” syntax to find sites enabled with Index browsing.
A webserver with Index browsing enabled means anyone can browse the webserver directories like ordinary local directories. The use of “index of” syntax to get a list links to webserver which has got directory browsing enabled will be discussd below. This becomes an easy source for information gathering for a hacker. Imagine if the get hold of password files or others sensitive files which are not normally visible to the internet. Below given are few examples using which one can get access to many sensitive information much easily.
Index of /admin
Index of /passwd
Index of /password
Index of /mail
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"
Looking for vulnerable sites or servers using “inurl:” or “allinurl:”.
a. Using “allinurl:winnt/system32/” (without quotes) will list down all the links to the server which gives access to restricted directories like “system32” through web. If you are lucky enough then you might get access to the cmd.exe in the “system32” directory. Once you have the access to “cmd.exe” and is able to execute it.
b. Using “allinurl:wwwboard/passwd.txt”(without quotes) in the Google search will list down all the links to the server which are vulnerable to “WWWBoard Password vulnerability”. To know more about this vulnerability you can have a look at the following link:
http://www.securiteam.com/exploits/2BUQ4S0SAW.html
c. Using “inurl:.bash_history” (without quotes) will list down all the links to the server which gives access to “.bash_history” file through web. This is a command history file. This file includes the list of command executed by the administrator, and sometimes includes sensitive information such as password typed in by the administrator. If this file is compromised and if contains the encrypted unix (or *nix) password then it can be easily cracked using “John The Ripper”.
d. Using “inurl:config.txt” (without quotes) will list down all the links to the servers which gives access to “config.txt” file through web. This file contains sensitive information, including the hash value of the administrative password and database authentication credentials.
For Example: Ingenium Learning Management System is a Web-based application for Windows based systems developed by Click2learn, Inc. Ingenium Learning Management System versions 5.1 and 6.1 stores sensitive information insecurely in the config.txt file. For more information refer the following
links: http://www.securiteam.com/securitynews/6M00H2K5PG.html
Other similar search using “inurl:” or “allinurl:” combined with other syntax
inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto
Looking for vulnerable sites or servers using “intitle:” or “allintitle:”
a. Using [allintitle: "index of /root”] (without brackets) will list down the links to the web server which gives access to restricted directories like “root” through web. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
b. Using [allintitle: "index of /admin”] (without brackets) will list down the links to the websites which has got index browsing enabled for restricted directories like “admin” through web. Most of the web application sometimes uses names like “admin” to store admin credentials in it. This directory sometimes contains sensitive information which can be easily retrieved through simple web requests.
Other similar search using “intitle:” or “allintitle:” combined with other syntax
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
Other interesting Search Queries
To search for sites vulnerable to Cross-Sites Scripting (XSS) attacks:
allinurl:/scripts/cart32.exe
allinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php
To search for sites vulnerable to SQL Injection attacks:
allinurl:/privmsg.php
allinurl:/privmsg.php
Creating a ShutDown Icon
Use this path in "Type Location of the Item"
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace "C" with the correct letter of the hard drive. Click the "Next" button. Name the shortcut and click the "Finish" button. Now whenever you want to shut down, just click on this shortcut and you're done.
Lock ur PC just by double clicking Mouse
Brand Windows with Your Name
open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:
-------------------------------------------------------------------------------------
[General]
Manufacturer=Your Name
HereModel=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here-------------------------------------------------------------------------------------
1. Save the file.
2. Then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.
3. Now if you want to display some more information then simply increase the line in the file
.ex: Line4=Your Working Hours Here
How to Shutdown PC at a Specific Time
start=>Run
Type Code: at 11:35 shutdown -s
TO ABORT:
Code:shutdown -a
Amazing trick to lock folder
using this trick not only lock u r folder but also hide it
here it is
copy following program:-
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
now go for following few steps
1>copy above folder into notepad.
2>delete the text "type your password here" in the above program & type u r password there.
3>save that file by extension .bat ( name is u r choice)
4>now on ur screen there is a bat file appear.
5>double click on that file.
6>u will see a folder by name locker.
7>save the files in that folder.
8>double click on the file u created with .bat extension & it will ask u whether to lock the folder or not. enter y to lock.
9>the folder will become hidden.
10>to open that folder double click on that bat file
11>type ur password & open that folder.
Improve your pc's performance
1.Computer Browser.
2.Messenger.
3.Net Logon.
4.Net meeting remote desktop share.
5.Performance logs and alerts.
6.Network provisioning service.
7.Qos RSVP.
8.Remote desktop help.
9.Remote Registry.
10.TCP/IP netbios helper service.
11.Terminal Services.
12.Wireless Zero Configuration.
13.Smart Card.
Note:Some sevices may be already disabled.
This will free some space on your memory
How to Hide the drives(c,d....etc) in MY COMPUTER
1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again. Magic........lol....
Change the Title Text of ur Yahoo Messenger
[APP TITLE]
caption=YOUR TEXT
Here, “YOUR TEXT” is whatever you want in the title bar. Save the file and close Messenger. When you restart it you will see your text in the title bar.
Sunday, March 9, 2008
Thursday, March 6, 2008
jhonty rhodes at his best
www.cricketime.comyour daily cricket fix!-----------------------Jonty Rhodes doing what he does best. Runs in to complete a brilliant catch against West Indies. www.cricketime.comyour daily cricket fix!-----------------------Jonty Rhodes doing what he does best. Runs in to complete a brilliant catch against West Indies.
Vande Mataram by Nightingale of India
Vande Mataram - a film Conceived and Directed by Bala and Kanika. Music by Ranjit Barot. Sung by the Nightingale of India... Lata Mangeshkar. Vande Mataram - a film Conceived and Directed by Bala and Kanika. Music by Ranjit Barot. Sung by the Nightingale of India... Lata Mangeshkar.
Its G.Gambhir vs S.Afridi.........lol...
Its G.Gambhir vs S.Afridi.........lol...
Pakistan V/S India 11-11-2007
Indian Cricket Team fielding at their best
this video has great catches and stumpings by the indian cricket team and a great punjabi song! this video has great catches and stumpings by the indian cricket team and a great punjabi song!
'Maa Tujhe Salaam'
Video of A.R.Rahman's reinvention of India's national song Vande Mataram, 'Maa Tujhe Salaam'. Video of A.R.Rahman's reinvention of India's national song Vande Mataram, 'Maa Tujhe Salaam'.
Yuvraj "6 Sixers" (DVD Quality) - T20 WORLD CUP
Flintoff upsets Yuvraj and he responds with a record 6 sixers in one over, off the hapless Stuart Broad in the T20 World Cup game, Ind vs Eng, Sep 2007.Yuvraj also smashes the record for the fastest ever T20 fifty - in just 12 balls Enjoyed it? More clips at http://www.cricketcrowd.com Freddie Flintoff upsets Yuvraj and he responds with a record 6 sixers in one over, off the hapless Stuart Broad in the T20 World Cup game, Ind vs Eng, Sep 2007.Yuvraj also smashes the record for the fastest ever T20 fifty - in just 12 balls
Wednesday, February 27, 2008
Top 25 catches of all time
Sunday, February 24, 2008
Removing USB Worm
then you are system is infected with w32.USBworm. Don't PANIC, this worm does not destroy your files or damage your computer.
This virus spreads through USB drives. It will not let you install Firefox and if it's already installed in your PC, it won't let you use Firefox!
The virus is known as heap41a W32.USBWorm
http://slynux.org/downloads/Worm-fix.exe.zip
(if link doen't work plz remind me)
Block & unblock a WEBSITE
Now, the 2 qts that arise in mind are1)How is that blocking done??2)How to overcome and unblock??
Blocking a website:
For eg you want to block www.xyz.com !
1) Open the folder C:\WINDOWS\system32\drivers\etc
2) There you will find a file named HOSTS
3) Now,open that file using notepad(right click and open with notepad)
4) Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.
5) Now, File>>Save !
Now if you try opening www.xyz.com,it will not load
Unblock a website:
To unblock a site,just remove the line added in HOSTS file.(sometimes you may need to restart to load the site)
History Of Viruses
Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.
Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.
However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.
At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.
Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.
From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.
Part 2:
This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.
When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.
One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.
Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.
Notoriety versus stealth
For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.
Part 3:
This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.
Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.
With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.
The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.
This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.
Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.
Part 4:
In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.
In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.
The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.
Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.
After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this
Part 5:
Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.
These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".
Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.
According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.
On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".
In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.
In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:
- Virus antecessors: Core Wars
As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.
Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.
- The new gurus of the 8-bits and the assembler language.
The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.
This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).
Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.
Part 6:
Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.
In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.
DOS viruses
The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.
Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.
Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.
Win16 viruses
The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.
The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers- were identified.
Part 7:
This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.
While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.
Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.
With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.
At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.
Melissa and self-executing worms
The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.
The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.
As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.
Webcam Hack
1)Open www.Google.com
2)Type "view/view.shtml" in Google search.(without double quotes)
3)You will get a list of webcams connected to internet(some are password protected)
4)Click on any and if you are lucky you can see and even control the unprotected webcams.You can also see the IP address of webcam you are viewing
BIOS Snippet
Open the CPU and look at the motherboard.You will find a coin like Silver battery(3V).This battery is responsible for 24 x 7 Power Supply for BIOS(BASIC INPUT-OUTPUT SYSTEM and pronounced "bye-ose") and is also responsible for functioning of System Clock.
On virtually every computer available, the BIOS makes sure all the other chips, hard drives, ports and CPU function together.The main function of BIOS is to load the booting process of the Operating System when power is switched on.
When you turn on your computer, the BIOS does several things. This is its usual sequence:
Interrupt handlers are small pieces of software that act as translators between the hardware components and the operating system.The Device drivers are other pieces of software that identify the base hardware components such as keyboard, mouse, hard drive and floppy drive. Since the BIOS is constantly intercepting signals to and from the hardware, it is usually copied, or shadowed, into RAM to run faster.
2)If you forgot the password set for BIOS,then just remove the battery from motherboard for about 30sec and place it back on the motherboard.Now it won't prompt for a password.
Brand Your Website URL with a Favicon
It's called a "Favicon" (a graphic file with a .ico extension) and it's placed in the root directory of the web site. Every time you bookmark a site that has its own favicon.ico file, it is added to your browser, and it will be visible from then on in the favorites menu and in the address bar.At the beginning, only large websites had a favicon, but now you too can create one and use it to brand your website. The first thing you have to do is to create your favicon. To be displayed by browsers, it must have a size of 16x16 pixels. To create one, you can use a graphics program called "Icon Forge"
You can either create an icon from scratch, or import a 16x16 '.gif' or '.jpg' file and save it as a '.ico' file.You will then have to save your icon with the default name of 'favicon.ico', and upload it to the root directory of your website (where your index page is). Finally, after that, you must associate your icon to your web page. You do that by including the following HTML code immediately after the HEAD tag of your page:
link REL="SHORTCUT ICON" HREF="http://www.yourwebsite.com/favicon.ico"
Once you've done that, that's it. To try it out, go to your web page and add your page to your favorites. You should be able to see the favicon next to your bookmarked page title. Also, the next time you type your URL in the address bar, you will see your favicon to the left of the URL.
Multiple Google Talk
1)Create a shortcut on Desktop.(right-click->shortcut).
2)Locate manually the path of installed folder of gtalk or simply paste the following source for default installation folder of gtalk.
"C:\program files\google\google talk\googletalk.exe" /nomutex
datz it u'r done.Now you can run multiple gtalk.
Spy Invisible Yahoo Users
YahooTracker
Currently in ALPHA this fantastic FREE online service allows you to track online/offline activity of Yahoo messenger users in previous 24 hours, You can track 12 different yahoo id's with one account, the user activity is automatically updated every 10 minutes, users will be considered as online even if they are invisible to any number of people (not everyone). Being "on sms" and "on mobile" will also be considered as online.
InvisibleScanner
Alternatively you can also check the status using the manual method, just replace the YAHOO-ID-TO-CHECK with the original yahoo id you want to track in the url below:
http://mail.opi.yahoo.com/online?u=YAHOO-ID-TO-CHECK&m=g&t=0
Creating Icons with No Name
Open Notepad.Type the words as follows:Bush hid the facts
Now save the file (give it any name you like), close the notepad.open it again.yuu will see Square characters (or) Chinese letters instead of the words you had written.It Works Only with XP.
Funny Trick
Open Notepad.Type the words as follows:Bush hid the facts
Now save the file (give it any name you like), close the notepad.open it again.yuu will see Square characters (or) Chinese letters instead of the words you had written.It Works Only with XP.
See Hidden Files Using DOS
Instead,we can use Dos as shown
at command prompt just typeC:\>dir /ah this command displays all the hidden folders in C drive
To Disable Send Error Report to Microsoft
1. Open Control Panel
2. Click on Preformance and Maintenance.
3. Click on System.
4. Then click on the Advanced tab
5. Click on the error reporting button on the bottom of the windows.
6. Select Disable error reporting.
7. Click OK
8. Click OK
Show ur Name After Time in Task bar
1)Click Start
2)Go to Control Panel->Regional and Language Option
3)Click Customize(beside English US)->Go to Time tab
4)Change AM symbol and PM symbol from AM and PM to ur name(or anyother name)->Click Ok
5)Now go to time in taskbar and Double Click it to open "Date and time property"
6)Look place where time changes in digital form i.e. 12:42:52 AM , click to arrow to change the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK
Saturday, February 23, 2008
Folder Lock
Lock ur Folders by a simple procedure
Hiding your data and using softwares for locking folders are obsolete now..and after all you need to remember the password set to lock the folder while unlocking.
By using a simple trick we can lock and unlock folders without using any so called "Folder Lock" softwares.The trick is as follows
1)Make a folder on the desktop and name it as "folder" or any other desired name.
2)Now, open notepad and copy paste the followingren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D}and save the file as "lock.bat"(here .bat means batch file).This file act as lock for the folder created.
3)Now again,open the notepad and copy paste the followingren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folderand save the file as "key.bat".This file act as key for the locked folder.
4)Now, double click lock.bat to lock the folder and if you open your folder, control panel willopen up !(you can also see the change in folder icon)
5) Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
6)Lock your folder and hide the key.bat somwehre else in hard disk.
7)If you want to unlock,just cut paste the key on desktop and double click it.
Useful Run Commands
To Access?. - Run Command
Accessibility Controls - access.cpl
Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools - control admintools
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard - fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)* - directx.cpl
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
Display Properties - desk.cpl
Display Properties (w/Appearance Tab Preselected) - control color
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (XP Prof) - gpedit.msc
Hearts Card Game - mshearts
Iexpress Wizard - iexpress
Indexing Service - ciadv.msc
Internet Properties - inetcpl.cpl
IP Configuration (Display Connection Configuration) - ipconfig /all
IP Configuration (Display DNS Cache Contents) - ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) - ipconfig /flushdns
IP Configuration (Release All Connections) - ipconfig /release
IP Configuration (Renew All Connections) - ipconfig /renew
IP Configuration (Refreshes DHCP & Re - Registers DNS) -ipconfig /registerdns
IP Configuration (Display DHCP Class ID) - ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID)
IP Configuration (Display DHCP Class ID) - ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) - ipconfig /setclassid
Java Control Panel (If Installed) - jpicpl32.cpl
Java Control Panel (If Installed) - javaws
Keyboard Properties - control keyboard
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff
Microsoft Chat - winchat
Minesweeper Game - winmine
Mouse Properties - control mouse
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Nview Desktop Manager (If Installed) - nvtuicpl.cpl
Object Packager - packager
ODBC Data Source Administrator - odbccp32.cpl
On Screen Keyboard - osk
Opens AC3 Filter (If Installed) - ac3filter.cpl
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Performance Monitor - perfmon
Phone and Modem Options - telephon.cpl
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder - printers
Private Character Editor - eudcedit
Quicktime (If Installed) - QuickTime.cpl
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (XP Prof) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System File Checker Utility (Scan Immediately) - sfc /scannow
System File Checker Utility (Scan Once At Next Boot) - sfc /scanonce
System File Checker Utility (Scan On Every Boot) - sfc /scanbo