Wednesday, February 19, 2014

How to stop virus or trojan attacks

Hello Friends I am back again with my new Hacking article " How to stop virus or Trojan attacks" from infecting your system. After previous three hacking classes about "Introduction to virus, Trojan, backdoor" and "Different types of Viruses" most of the users asked How to prevent our systems from infecting from viruses. There are several ways to protect your system from being infected. I will try to share almost all tricks. And the most important thing is that after reading this article your system will be 100% secured from all types of Virus attacks but Trojan attacks can happen because of your negligence but i will try to tell all things so that this can also  does not happen. So Guys read on and stop wasting time in removing viruses or Trojans from your computer because from now a single virus cannot enter into your system Its my Guarantee and challenge to all hackers.
If you want to know that your system is either infected by viruses and Trojans then these are certain techniques to know that:
1. Your Computer might be running slow usual than normal.
2. Some programs might open without your permission.
3. System start up takes too much time to start.
4. Various Error messages appear on Screen when you open something or without opening also.
5. System registry has been disabled or folder options is missing.
6. The most important antivirus shows messages of detecting viruses time to time.
7. While scanning your system from any antivirus or anti spyware tool its showing viruses and you noticed that viruses are not deleting.
and much more...

Have you ever think about the reason why your system is got infected. What has infected your system and if its done by any of your friend How he has done it. Surely No, or in some cases you have tried to find the answer but you are not able to get proper answer. But story is different here , I will tell all the ways How your system can be Get infected and How you can protect it if its already infected How you can resolve the problem. So here are few things How your System got Infected , some might be knowing this but by some reason they have ignored them.
How a System is got Infected because to Negligence?

1. Using Cracked Versions of software specially security ones like antivirus, anti-spyware etc. 
Why I have said this is the first and major cause of infection because of the following simple reason that All hackers know that general internet user public always searches for cracked versions of software's and wishes to use them for free and Hacker take benefit of them. You all now be thinking how it help hackers. We know that almost all antivirus show each and every keygen as virus or some trojan depending upon its type. Now if we all know that then how come hackers will forget this fact so what they do they attaches trojans and viruses to these files and at the time When your antivirus shows it as virus you ignores the alert and keep the keygen means trojan running.
NOTE: And Guys an important note for you all, If your antivirus doesn't show any keygen or crack as a virus then don't ever think that its not a virus but its a most dangerous thing. Why dangerous because now Hacker has used some more brain to fool you that is he has made the virus undetectable simply edit the hex code of original virus. So what is the moral of story Please don't use cracked versions.
Now you all be thinking that if we don't use the cracked versions then how we will able to get full versions of the software's. Don't worry when I am there no fear drink beer and enjoy everything for free. Its solution will be in solutions step just read article.

2. Pen drive or USB drive :
The biggest cause of infection of your system is usb drives and external hard disks.
Now how a virus enters into your system using USB drives. You have connected your USB drive to your friends computer and by chance (sorry its for sure i.e 100%) your friends system is infected by virus or Trojans and its the property of Virus that it replicates itself using memory. So when you connect your USB to your friends computer your USB is now infected by virus and now when you connect this USB to your PC using the property of your Windows that it searches the files in Newly connected device and autorun the device and for doing this it loads the index of your USB's file system into Memory and now if USB has virus its the property  of virus its replicates itself using system memory. Now if you are using good antivirus , your antivirus will pop warning and alert messages and some times you ignores them means your system is also infected. For USB drive virus solution keep reading article.

3. Downloading things from Unknown Sites:
Most of the users searches for thing over the internet and where ever they find their desired result means file that they want they start downloading that from that site only. Now how it affects your system suppose you want to download any wallpaper say Katrina Kaif. Now hackers know the fact that Katrina has a huge fan following and user will surely going to download it. Then what they do they simply bind their malicious codes with some of files and when users download it his system is infected and he can never imagine that the virus has come from wallpaper that he has downloaded from unknown site. For its solution read on article.

4. The most important one Becoming a Hacker like Me (ROFL but its truth).
Why I have mentioned this you might be clear from the above discussion. Most of the internet users always curious to know ways how can i hack my friends email account or his system for these they download all type of shit from the internet and believe me 99.9% of this shit contains viruses and Trojans that sends your information to the providers. Now I don't say that stop hacking but try to follow some basic steps to learn hacking and first of all you must know how to protect yourself from such type of fake software's. For its solution read on article.


Now after discussing the things How you system is got infected by your simple negligence. Its time You should Know How to fix them and protect your system from all types of viruses and trojans.

HOW TO STOP VIRUS OR TROJANS ??
1. Using Good Antivirus:
There is a nice misconception between the internet users that full antivirus provides better security. Ya its 100% truth but full antiviruses paid ones not the cracked ones.
There are several other solutions to them that you will get for absolutely Free and I guarantee that it will protect your system 100% just doing some little configurations.


Best Free Antivirus : Avira Personal Antivirus i.e Antivir.
You can download avira for free from :

http://www.filehippo.com/download_antivir/

Now after downloading the antivirus what you have to do to make it as good as paid antiviruses.
a. Install the antivirus and update it. Note updating antivirus regularly is compulsory. Don't worry its not your work it will update itself automatically whenever update is available.
b. After Installing at the right hand top corner you will see a "CONFIGURATION" button. Just click on it now a new window will pop up.
c. Now There at left hand top you will see a click box in front of Expert is written . Click on that now you will see several things in it. Now do the following setting one by one.
1. Click on "Scanner" click on all files and set the "Scanner Priority" to high and click on apply.
2. Click on "Guard" and click on all files and click on "Scan while reading and writing" and then click apply.
3. Click on "General" Now click on select all and click on apply. In general tab only go to WMI section and click on advanced process protection and then click on apply.
4. After doing that restart your PC.
Now you have made your free antivirus an equivalent to the paid one..

Best Free Anti-Spyware: Spyware Terminator with crawler Web security toolbar.
Download It for free :

http://www.filehippo.com/download_spyware_terminator/

Install spyware terminator with web security tool bar . Now your following problems are being solved:
1. No Trojan can attack you.
2. Protection from Malicious websites and much more..
2. Solution for Cracked version Software's:
As I have mentioned earlier never download cracks and keygens directly to you system but several other methods are there while you are searching for Crack or Keygen first try to search for Serial Key if you found it then its awesome and if not what to do.
Before downloading any Crack and Keygen . Go to the Website:
http://www.virustotal.com/ 

Now copy the download link of the Keygen or crack in the URL box provided on website this website contains all the world famous antiviruses and it will scan file for you if it contains any virus just ignore that otherwise have fun with crack or Keygen.

3. Pen drive or USB drive solution:
How you can protect your system from being infected from the pen drive. Just do the following three things rest is being cared by your antivirus.
1. Turn off Auto Play Devices:
To do it Go to Start Menu--> RUN-->type gpedit.msc and press enter-->User Configuration-->Administrative templates-->System-->Turn off Autoplay--> click on enable and then select all drives.
2. Turn of Computer Browser service:
To do it Go to Start Menu--> RUN-->type services.msc and press enter-->then Find Computer Browser service and disable it and restart your system.
3. Most important one Always scan the Pen drive or External hard drives after connecting them.

4.Downloading things from Unknown Sites Solution:
The solution of this problem is already provided Web browser Security toolbar will help you in surfing only secured and genuine websites and if you want to visit and download Virus Total will help you to identify the file whether its infected or not.
5. Now for Hacker like me i.e Method to use or test Hack tools.
Why I have mentioned this is simply because Hackers always take benefit of these noobish tricks that they attach viruses with files and name them as hack tools . So avoid them if you are too curious like me. Then there are several ways to Handle it.
1. Use Deep Freeze on C drive: For testing Hack tools always use deep freeze as after the next restart your system will be at same position as it was previous.
2. Install Virtual Box and over virtual box install another Windows and test all hack tools using virtual windows. This will protect your system from being infected. Also It will give you more knowledge about handling the viruses and other situations like when something wrong is done what i have to do.
3. Create two to three fake email ID's and use them for testing Keyloggers and other fake email hacking software's.


Android attacked by Malware hidden in Game

Its very rare in internet world to listen about such news that Android Malware detected but recently a chinese hacker again tries to hack android, and this time, he used a game named "The Roar of the Pharaoh". The bug was spotted by the security team(penetration testing) from Sophos, well known security firm. The game does not show any security or permission issues while user installs it, so Android user believes that it is a reliable and non-malicious software and will not harm the system. So friends please avoid android games and applications from unknown publishers as it may result into critical information leak and sometimes into OS crash.

But, actually what the game does is that it collects all the sensitive and personal information from the device(like the normal Trojans does) and sends it to the author via an SMS with premium rates, without taking the user's permission(means in the background). The Trojan sends information like the phonebook entries, SMSs, IMEI number, phone number, OS version etc. Though no cases illegal usage of the users information have been reported yet but researchers believe that more damage can be done using this bug.
According to the vendor, the malware runs as a service called "GameUpdaterService", which sounds like a legitimate name for an application and user thinks that some game is updating, but its just another indication of the social engineering element of the campaign which makes it look like reliable application, next to the actual brand-jacking of a legitimate game’s name.
The application has been detected as an Stinter-A, the mobile phone companies process the money to the authors before the application user gets the bills.Michael Sutton, vice president of security research at cloud-based security provider Zscaler, said "the fake "The Roar of the Pharaoh" app for Android reflects the shift of malware authors to target the Android platform, whether smartphones or tablets. Fake game apps that are really Trojans are increasing and "this is a typical scam for Android now," he added.
The interests of the hackers has now shifted towards the Android phones from computers. The android officials have not spoken anything much about this application, but have warned its users to beware of such malicious applications.
The authors have not been caught yet, and the Chinese Security is still working to put them behind the bars.

Hacking Windows admin password with Linux

Most of times specially in our college we don't have the access to the admin account, and whenever we need admin privileges we have to ask Lab assistant and that's the only part of the Lab that i never loved when i was student. Now suppose you want to install a software on that system. What you will do now? Ask the admin to enter the password for you or simply hack it by yourself. I will tell you frankly that i have never opted cheap practices in my life. Whenever i need administrator right i have hacked it but guys don't do it like that ways because i got suspended from lab twice for doing that. 
Today i will explain you how to reset the password using the Ubuntu Live CD or DVD. This technique involves just 5 basic steps to hack the windows admin password. Using this technique you have hack Windows XP admin password, Windows Vista admin password, Windows 7 administrator account. In simple words are windows OS admin account password just in few commands.
For a hacker Linux OS is a boon and hackers must know how to use Linux. Just only don't know they must be expertize in that as Linux is open source and so you can easily observe how things are really happening which really helps in developing new tricks and hacks. So friends, if you wish to be a professional hacker, Please Learn Linux.

Resetting windows password using Ubuntu Live CD or DVD

REQUIREMENTS:
For this hack you will require the Ubuntu Live CD and CD or DVD drive in the victim's PC whom admin or administrator account you want to hack.

Steps to Hack or reset the Windows administrator password:

  1. Insert Ubuntu Live CD and boot from it.
  2. Open terminal and install chntpw in Ubuntu. To do so use the following commands.
    sudo apt-get update sudo apt-get install chntpw
  3. Now mount your Windows volume. In my case it was dev/sda1. Replace it with yours.
    sudo mkdir /media/WINDOWS sudo mount /dev/sda1 /media/WINDOWS
  4. Now navigate to the Windows configuration folder.
    cd /media/WINDOWS/WINDOWS/system32/config/
  5. To reset the administrator password enter
    sudo chntpw SAM
  6. After completing this command you will see 5 different choices. Select the 1st one and press Enter and its done. 
  7. Now restart your system, it will not ask any password. 


Monday, February 10, 2014

Create Your Own Command

There is no doubt that Microsoft Windows is the most widely used operating system in all parts of the world. Apart from being simple to use, it is quite rich in features as well, which makes our lives quite easy.

The Run command available on Windows operating system is one such power packed feature that lets you to open a document or an application instantly with the help of just 1 command. So, rather than clicking several icons or using multiple commands, you can use the Run command to open any program or document instantly. For that you will need to Create Run Commands for any software of your Choice which you use Frequently.
But, do you know how to Create Run Commands of your Own? Well, it is really easy, which involves just few steps. Through this article, I will help you understand how to access your favorite applications by creating custom Run commands.

Open Run Command:

Before I show you how to create your own Run commands, let’s take a quick look on how to open Run Command. First of all, you need to open the Run window by just pressing the Windows Key along with the R key, i.e. Windows + R. Now, you have to type the name of the program that you desire to open up or execute. Unfortunately, not all programs can be accessed through this method. So, let me show you how to create Run commands that do not come as inbuilt commands

Steps to Create run commands of your own

Step 1. The first step is to select the software or application for which you want to make custom Run command. For example, let us consider Google Chrome as the example here. Remember, you can choose any application other than which is already there in the Run command.

Step 2. In the second step, right click on the desktop of your computer system and make a new shortcut. Right click > New > Shortcut
Step 3. As you select the Shortcut option in the 2nd Step, it will open up a dialog box. And, the dialog box will ask you path of the application or software for which you want to create the Run command.
Step 4. Now, you need to browse through the files and choose the one that shows “chrome.exe”. Well, it is quite obvious that all the executable files can be found in the C drive (or wherever the Operating System has been installed), inside the folder “Program Files”. For example, “C:\Program Files\Google Chrome\chrome.exe
Step 5. Once you are done with Step number 4, just click on “Next” button and simply provide a relative name to that shortcut. Remember, the same name will be used later in the Run command.
For example, “GC” for Google Chrome
Step 6. Now, click on the “Finish” button. Once it is done, an icon related to that application or software will show up on your computer’s screen. It means that the process of creating shortcut has been done successfully.
Step 7. In this step, just cut and paste that recently made shortcut icon into your computer’s root drive, in its Windows folder.
For example, C:\ Windows , Make sure you are the administrator of the computer or have its password.
Step 8. Now, you are done with the set up and can run the application through Run Command. Just go to Run and enter the keyword “GC”, and Google Chrome will begin executing.
So this was a Short but Usefull Tutorial to Create Run Commands for any software in windows,I Hope this Post will Easeup your Work, Stay Tuned and Subscribe to this Blog to Recieve Updates Everytime a New article is posted. Subscribe Box.

Monday, February 3, 2014

Google Tricks


Some funny tricks about Google
1). Do a barrel roll Trick:
Write “Do a” or complete “Do a barrel roll” or “Z or R Twice” in Google Search bar and Google’s search page will rotate at 360 degrees.

2). Askew Google Trick:
Type “Askew” or “Tilt” in Google search and the whole page will tilt slightly.

3). Google Gravity:
Enter “Google Gravity” in the Google search bar and hit the first link. All the components of the page will be pulled down by gravitational force.

4). Chuck Norris Trick:
Search “Chuck Norris Google” or “Chuck Norris Google Trick”, on Google and open the first link. The page says that Google won’t search for Chuck Norris because it knows you don’t find Chuck, he finds you.
Note: This trick used to work by just searching “Chuck Norris” on Google but it no more works that way.

5). Recursion Google Trick:
Search “Recursion” on Google and Google will keep on recurring it by saying “Did you mean Recursion?” even if you spelled it correct for the very first time.

6). Google MentalPlex Search:
Google introduced this page as fun on April fool day in year 2000. According to the page Google said that you can now search by just visualizing and thinking which ofcourse was just a joke.
Check out the Google MentalPlex Pageand read what Google did with users on 1st April, 2000. If you want to Laugh Out Loud then read full details then read the FAQand Illustrationpage of Google MentalPlex Joke.

7). Play Google Pacman:
Google Search “Google Pacman” and open first link. Now click on “Insert Coin” and enjoy the game.

8). The Answer to Life the Universe and Everything [42]:
Search on Google “the answer to life the universe and everything” and it will calculate it equals to “42”

8). I’m Feeling Lucky:
When you hover you mouse on “I’m feeling lucky” button of Google Search, it randomizes itself and a cool “I’m feeling ____” comes up. And when you click that button say “I’m feeling playful”, Google takes you to the relevant page. Try this and have fun.
Google search riddles “ agoogleaday.com” will open when you click “I’m Puzzled” Button.
Different buttons include:
*.I’m Feeling Doodely
*.I’m Feeling Puzzled
*.I’m Feeling Hungry
*.I’m Feeling Wonderful
*.I’m Feeling Artistic
*.I’m Feeling Trendy
*.I’m Feeling Stellar

9).Create google page with custom name:
 Create your own Google Homepage: type “goglogo” in Google search, hit enter and open the first link.
Type whatever you want to see as a logo of your Google Homepage and hit enter key.

10). Ninja in Google Reader:

Open Google reader, now hit these keys “up, up, down, down, left, right, left, right, B, A”. After you are done hitting the keys, a ninja will appear in the sidebar and it turns greenish