This is default featured post 1 title

This is my Blogger (www.tricktipsforfun.blogspot.com) my name is markib i like posting new things on ,my blogspot this is my best picture.

Thursday, May 17, 2012

Programme for a simple virus

creates a reg file and puts it in the registry then it creates a file in C:\ called 2.bat the 2.bat file copys itself into other files and opens them each file does the same 2.bat but they EACH loop so it keeps on opening other batches that each loop and open other batches the only way out is to boot in safe mode. I tried this one a couple comps and on one of them it wasnt very effective and it only opened a limited amount of files and im not sure why because i was able to crt+alt+del...

How to stop virus or trojan attacks - Hacking class

      Hello Friends I am back again with my new Hacking article " How to stop virus or Trojan attacks" from infecting your system. After previous three hacking classes about "Introduction to virus, Trojan, backdoor" and "Different types of Viruses" most of the users asked How to prevent our systems from infecting from viruses. There are several ways to protect your system from being infected. I will try to share almost all tricks. And the most important thing is that...

How to remove Virus from USB Drives

One of the ways by which a virus can infect your PC is through USB/Pen drives. Common viruses such as ’Ravmon’ , ‘New Folder.exe’, ‘Orkut is banned’ etc are spreading through USB drives. Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB Drive Whenever you plug a USB drive in your system, a window will appears Don’t...

How to Bypass Windows XP Firewall using C program

Hello Friends, today i will share with you the technique using which we can bypass windows-xp service pack-2 firewall. Its a 100% working hack and its basically an exploit in windows XP. This techniques is nothing but the vulnerability found in windows-xp sp2 firewall. Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious...

How does Antivirus software works or detects virus

Hello friends, today i will explain you all how an antivirus software works and detects virus. Most of you already know that what is antivirus, but have you ever tried to understand how it works and why it requires updates regularly? How antivirus searches for viruses and detects the virus in the file and eliminates it or heal it. Working of antivirus involves two basic technologies namely: 1. Dictionary based continuous and fragmented string search 2. Suspicious activity detection (process...

Hacking Bank Account Information

Most people learning hacking always have a keen interest in knowing that how they can hack bank accounts of other people. But most of them find it pity much difficult such that now they have made a perception that bank account information like credit cards or debit cards or net banking passwords cannot be hacked. Its truth to an extent that hacking Banking account information and credit or debit cards passwords is most difficult and almost impossible part. Today i will discuss with you why hacking...

Email spoofing Hacking class

Hi friends, After the article about SMS spoofing, today i will share with you basic idea about What is email Spoofing? How email spoofing works? What are the different ways to send spoofed emails? Can we detect spoofed emails or not?   In my later hacking class tutorials i will explain you how to send spoofed emails using email spoofing tools or by simply web applications. So Let's start from very basic.. What is Email Spoofing?  Email spoofing refers to the process...

Page 1 of 1112345Next