Friday, October 16, 2009

12 TRICK TO REMOVE VIRUS

12 TRICK TO REMOVE VIRUS



Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.
1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.
2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive.
3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).
4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.You can also use a pop-up blocker to automatically block those pop-ups.
5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.
6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.
7. Install a good Antispyware program, that operates against Internet malware and spyware.
8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.
9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious program

SECRETS OF PROGRAM

SECRETS OF PROGRAM

There is a general misconception about security today. Most people would love to believe that their firewalls are completely capable to protect them from anything indecent. The sad part, they could not be more wrong. Hungry Hacker aim to prove it with three separate programs that can compromise the security of computers. You have the opportunity to say “What’s a backdoor?” Yes, these programs were created in 1990, but still pose a real threat today. It is the first two that are still being developed.
Using these programs any noob can remotely access your computer without any Authentication and do whatever he wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :Work as a key logger.Send any Information from Victim’s PC to the Hacker’s PC.Run any program on the Victims PC.Display any Violating Image on victim’s Screen.Open the CD Drive of the Victim’s PC.Open any Web page on the Victims Screen.Disable any Specific Key or whole Keyboard.Shutdown Victim’s PC.Start a Song on the Victim’s PC.etc.etc…………..
Back Orifice / Back Orifice 2000
Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
Back Orifice uses a client-server model, while the server and client is the victim attacker. What makes Back Orifice so dangerous that it can install and operate silently. There is not required interaction with the user in, meaning you could its on your computer right now, and do not know.
Companies such as Symantec have taken steps to protect computers against programs that they consider dangerous. But even more attacks using Back Orifice 2000. This is due partly to the fact that it is still evolving, as open source. As stated in the documentation the goal is ultimately the presence of the Back Orifice 2000 unknown even to those who installed it.
Back Orifice 2000, developed for Windows 95, Windows 98, Windows NT, Windows 2000 and Windows XP.
Where can I download Back orifice 2000?
Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/
I infected! How do I remove it?
Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
How do I delete Back orifice 2000Click Start> Run, and type “Regedit”(without the quotes)Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”Right-click on this entry and click Remove. Now restart your computer.After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.Exit Windows Explorer and reboot again.
NetBus / Netbus 2.0 Pro
NetBus was established around the same time that the Back Orifice was in the late 1990’s. NetBus was originally designed as a program prank friends and family, of course anything too malicious. However, the program was released in 1998, and is widely used as a backdoor to manage computer.
Like the Back Orifice, NetBus allows attackers to do virtually everything in the computer victim. It also works well under Windows 9x systems, as well as Windows XP. Unlike Back Orifice, the latest version of NetBus regarded shareware is not free. NetBus is also implementing less stealthy operations, as a direct result of criticism and complaints of abusive use.
Where can I buy and download NetBus?
NetBus can be purchased and downloaded at the following address: http://www.netbus.org/
Ok, I am infected. Now what?
Fortunately, the latest version of NetBus is a valid program. It can be removed just like any other program. Previous issuance NetBus is a bit more tricky, however. If you are not lucky enough attacked with the latest version, the withdrawal process and in the Back Orifice.
How do I remove NetBus?Click Start> Run, and type “Regedit ‘(without the quotes)Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “Now, in the right box, looking as follows: “[Name_of_Server].”Exe Of course, you have to find the actual name of this file EXE-. Usually This” Patch.exe ‘or’ SysEdit.exe “, but may vary.Reboot and remove all traces of the actual program, which can be left. Additionally, you can set yourself NetBus, and then use its own function disposal.
SubSeven / Sub7
SubSeven or Sub7, has been established for the same purpose was to NetBus pranks. Sub7 actually has more support for pranks, and has more advanced users. Sub7 also widely used by the script kiddies, although that many firewalls and anti-virus software before initialization.
Since Sub7 not supported for several years, the threat is usually very low. Most security programs will not have any problem in ending Sub7 before it has a chance to be started. This shows that the importance to the modernization and security programs is critical, because the money was still there.
Nevertheless, it is widely used by those who have physical access to your firewall, or security programs. If access rights, the tool will work without restrictions.
Where can I buy and download Sub7?
Sub7 not supported more, and hence is not available for download on any legitimate websites. If you were to make a Google search, you would find links to download Sub7. However, this is not the official site, and should be considered dubious and dangerous.
Sounds harmless, How do I remove it?End of the following processes through the curator: “editserver.exe, subseven.exe”Delete the following files: “editserver.exe, subseven.exe, tutorial.txt.”
Why these programs is absolutely legitimate?
All the basis behind these programs is that they are designed to help people, not harm. While some like NetBus really were originally created for pranks, they switched routes to avoid legal problems.
These programs claim to be the legitimate remote desktop program, although they certainly easily used for malicious use. These programs really should be used to aid or customer support departments. Why all adolescents is to copy these programs goes beyond us, but leave the content of their networks, while computer is a good idea.
The advent of new technology has made these programs in some respects less effective. However, programs such as Back Orifice 2000, yet still evolving, so do not be surprised to learn that he works in the background, waiting for instructions. Since the best defense is a good offense, be sure to save a sharp eye on what is installed on the network computers. After all, an ounce of prevention is worth a pound of cure.

* HOW NOT TO GET HACKED

* HOW NOT TO GET HACKED

Protect Urself !Follow These Simple Guidelines n u are done

1. Stop using Internet Explorer and make the switch to Opera, it's more secure, plain and simple.
2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.
3. Get Adaware SE and immediately update it. (Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)
4. Update your anti virus
5. Boot into safe mode and run all three scans
6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.
7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it.
8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.
9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.
10. Make sure your firewall doesn't have strange exceptions.
11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your passwords.
12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.
Good luc

FORMATTING HDD WHILE WINDOWS

FORMATTING HDD WHILE WINDOWS

IF u think u cannot format c drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary codeformat c:\ /Q/X -- this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X -- this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000

format a:\ /Q/X -- this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000

HACKING TOOLS COLLECTION

HACKING TOOLS COLLECTION


ITS ABSOLUTE FREE & EASY TO DOWNLOAD, TO DOWNLOAD CLICK "READ MORE" AND U WILL GET DOWNLOAD BUTTON BELOW ...Features:

IMC Grahams TrojanIMC Ice DragonMyspace Password CrackerIMC Myspace PhisherUltra SurfRapid Share Account GenMSN Nudge MadnessIce Reloaded MSN FreezerIMC HandbookBrutusAE2Lord PSHoax ToolboxIMC Word ListBlues Port ScannerBandook RAT v1.35Project Satan 2.0EES binder v1.0File Injector v3Remote Desktop Spy v4.0Passive Terror v1.3 Final EditionDyn-DL (Dynamic downloader)Silent Assassin v2.0Net Scan Tools v4.2Rocket v1.0NStealth HTTP Security Scanner v5.8Attack Toolkit v4.1 & source code includedLegion NetBios Scanner v2.1Battle PongTeraBIT Virus Maker v2.8p0kes WormGen 2.0JPS Virus MakerIRC Ban ProtectionIRC Mega FlooderFTP Brute HackerRAR Password CrackerVbulletin 3.6.5 Sql Injection ExploitIPB 2-2.1.5 Sql Injection ExploitIPB 2-2.1.7 ExploitCain & Abel v4.9.3NetStumbler 0.4.0Cryptor 1.2VNC CrackMutilate File Wiper 2.92Hamachi 0.9.9.9pbnj-1.0U NEED WINRAR SOFTWARE FOR DOWNLOADING TOOLS


Download:http://rapidshare.com/files/34338957/Wi ... _Setup.rarpassword:www.rapidlinks.co.ukAFTER THAT U R READY FOR DOWNLOADING THESE TOOLSTHE URL LINK IS
http://rapidshare.com/files/34738681/IMC_Tool_Set.zipANOTHER LINK IS;-http://rapidshare.com/files/57355491/IMC_Tool_Set.zipCAUTION ;- PLS LOGG OFF U R AUTOMATIC UPDATE PROTECTION OF U R ANTI VIRUS SOFTWARE WHEN U INSTALIZATION OTHERWISE U R NOT ABLE TO DOWNLOAD SPECIALLYU HAD KASPERSKY.ENJOY !

LOCK THE FOLDER WITHOUT ANY SOFTWARE

LOCK THE FOLDER WITHOUT ANY SOFTWARE




FOLDER LOCK WITHOUT ANY SOFTWARE........FOR THOSE WHO ARE NOT KNOWING♠FIRST GO TO NOTEPAD AND WRITE THE BELOW CODE AND SAVE IT'S EXTENSION AS .bat THAT IS IT IS BATCH FILEif EXIST

"Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCKif NOT EXIST Locker goto MDLOCKER:CONFIRMecho Are you sure u want to Lock the folder(Y/N)set/p "cho=>"if %cho%==Y goto LOCKif %cho%==y goto LOCKif %cho%==n goto ENDif %cho%==N goto ENDecho Invalid choice.goto CONFIRM:LOCKren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"echo Folder lockedgoto End:UNLOCKecho Enter password to Unlock folderset/p "pass=>"if NOT %pass%==type your password here goto FAILattrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Lockerecho Folder Unlocked successfullygoto End:FAILecho Invalid passwordgoto end:MDLOCKERmd Lockerecho Locker created successfullygoto End:End


AFTER THIS CLOSE IT AND WHEN YOU WILL CLICK IT A FOLDER NAME "LOCKER"WILL BE THERE.Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.If you want to unlock your files,double click the batch file again and you would be prompted for password.Enter the password and enjoy access to the folder.

HACK FRIEND INTERNT PASSWORD

HACK FRIEND INTERNT PASSWORD

This is Really Amazing. I was moving through my Browser's settings and found the file where all the passwords are stored. I was really shocked that it allowed me to have a look at all the Username and Password which I had asked my computer to remember which also included my Internet Username and Password. But this is only possible in Mozila Firefox.To Hack your friends Password you only need even less than a minute and you can have a quick look at your friends Usernames and Passwords.Just follow the following steps:
Open Mozila Firefox
Goto Tools -> Options
In that goto Privacy -> Passwords.
There you will find View Saved Passwords Button Click on it.
It will show you a list of websites with the usernames. To get the Passwords Click on Show Passwords Button.
Now To get the Internet Password Just see for any IP address in the website column this is the Ip address of that computer and Username and Pass is what you want.
You can get pass of any account just look for the site name whose password you want to hack and on the right side you will get the Username and Password*******************************END***********************************

JAVA HACKING

JAVA HACKING
Edit any web page..
Go to the page you want to editCopy the below code into the url bar.javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0Hit go! the links will have turned a more saturated blue, and when you click somewhere you'll be able to edit text..Feel free to edit whatever you want on the page & u can save that page..Note: It doesn't work on orkut pages because of Main#.I know that this is Old , but i also know that Old is GoldLets see i edited google page

USE SOFTWARE FOREVER

USE SOFTWARE FOREVER

Now we download stuff almost daily. New products pop out so often. You can use any software forever you want. You can download trial version, right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.How it Works1. Open Time Stopper2. Browse and select .exe of required trial software3. Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)4. Choose any time5. Click open software on your selected dateIf you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.This is 100% free and 100% legal!!Download linkif u like this make some comments... : )

ACCESS DATA OF PASSWORD PROTECTED USER IN WHICH PC FAIL TO BOOT

ACCESS DATA OF PASSWORD PROTECTED USER IN WHICH PC FAIL TO BOOT

You may come across a situation in which your windows XP PC fails to reboot, and the most accepted solution to that problem is to re-format the Hard Disk. Before formatting, you should backup your files. If your computer is password protected, you won't be able to access them from outside, so here is a method for getting around this.Steps Boot the machine from Windows XP bootable CD. At the setup screen, select R to repair using Recovery Console. Now the console program will prompt you to select the Windows folder (eg. C:WINDOWS) where the Windows is installed (you need to enter a number from the list of folders shown to you).Type 'HELP' (without single quotes) and press enter for available commands. This is like a DOS program, but some features are not available.Change the current directory to the user's directory where you want to backup. Type 'CD "C:Documents and SettingsX"' (without single quotes) and press enter. Where X is the username. Now the current directory will change to "C:Documents and SettingsX". Now change the directory to Desktop by entering 'CD Desktop' (without single quotes) and press enter to go to the desktop folder.Type 'DIR' (Without single quotes) and press enter, you will be listed all the available files in Desktop. Type 'COPY a.doc D:BACKUP' (without quotes) and press enter, where a.doc is a file available in Desktop and the folder D:BACKUP available to copy the files.As in step 7,8,9,10 you can backup other folders like "My Documents", "My Music", etc. Note that you cannot use wildcards for COPY. I.e, you cannot copy all the files in a folder at once. You must copy one file by one.Tips Before doing this, try changing the password to blank so that you can access the data from another machine to easily drag and drop to copy your data.Warnings Any data not backed up will be permanently deleted when you re-format the hard drive, so make sure you back up any thing you want to keep.Things You'll Need A bootable Windows XP CD

WEBSITE NAME IN EVERY SEARCH ENGINE

WEBSITE NAME IN EVERY SEARCH ENGINE

HIS IS THE TRICK FOR THOSE WHOSE SITES ARE NOT CRAWLED IN GOOGLE OR ANY OTHER SEARCH ENGINE.FIRST OF ALL YOU SHOULD HAVE ROBOTS.TXT IN YOUR MAIN SITE DATABASE USING ANY FTP PROGRAM OR FILEZILLA SO THE SEARCH ENGINE CAN FIND YOUR SITE..WAHT IS ROBOTS.TXT?you probably know that when a search engine spider visits your site,one of the first things it does is look for a file called robots.txtwhich tells it which files and folders it can go and look at. by defalu,WORDPRESS lets every robot go everywhere.You may restrict some file not toshow in search engine.it is the file which says search engine what should be crawled.There are many plugins in wordpress to make robots.txt but you may create it your owncopy this text in notepad then save as robots.txtUser-agent: GooglebotDisallow: /*.pdf$Disallow: /*.php$Disallow: /*.js$Disallow: /*.cgi$Disallow: /*.xhtml$Disallow: /*.php*Disallow: /*.inc$Disallow: /*.css$Disallow: /*?*Disallow: /wp-*Disallow: /feed/Disallow: /trackback/Disallow: /cgi-bin/Disallow: /go/User-agent:*Disallow: /wp-content/Disallow: /wp-content/plugins/Disallow: /wp-admin/Disallow: /wp-includes/Disallow: /wp-Disallow: /feed/Disallow: /trackback/Disallow: /cgi-bin/or you can download the plugin for hereNOW,next step is to register your site in google.goto this address click hereyou can also register in yahoo search engine and many other by going to this address.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Aruz Parajuli, Aruz Parajuli