Steps to Write-Protect Your USB Drive: - MASTER SHWET"S ...



From BEST TRICKS SITE-1. Disable USB Devices:Disabling USB ports can be a smart idea to add security to the computer. This can be really handy if the computer is on a public place where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:Open the Registry Editor (Start -> Run -> Type?regedit?and hit Enter)In the registry, navigate to the following key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStorIn the right-side pane, double-click on “Start”.In the “Value data” field enter?4?and click on “OK”.Close the Registry Editor and reboot.2. Disable Notification Balloons in Windows 7 and Vista:You can now disable the annoying notification balloons that keeps popping up frequently with warning messages and reminders. Here is a step-by-step procedure to do that:Open the Registry Editor and navigate to the following key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AdvancedRight-click on the right-hand pane, and create a new “DWORD”.Rename it to?EnableBalloonTips, double-click on it and set the “Value data” to?0. Reboot the computer to see the changes in effect.3. Add “Recycle Bin” to My Computer in Windows 7 and Vista:Would you like to add the “Recycle Bin” icon to My Computer so that you need not go back to the desktop to access it when required? Well, here is how you can do that:Open the Registry Editor and navigate to the following key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpaceRight-click on “NameSpace” and select New -> Key. Name the key with the following name:{645FF040-5081-101B-9F08-00AA002F954E}Now, open “My Computer” and hit F5 to refresh the screen. This should show up the “Recycle Bin” icon4. Disable the Windows Task Manager:Need to limit access to your computer by disabling the Task Manager? Here is a simple registry hack to do this:Open the Registry Editor and navigate to the following key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\PoliciesRight-click on “Policies”, select New -> Key and name the key as?System.If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to:?HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System?in the Step-1 itself.Right-click on “System”, create a new “DWORD” and name it to?DisableTaskMgr.Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to?1?(0=Enable, 1=Disable).To enable the Task Manager, Set the “Value data” back to?0.Works on Windows XP, Vista and 7.5. Change the Registered Owner and Organization Name:Here is a simple hack to change the name of the Registered owner on your computer:Open the Registry Editor and navigate to:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersionOn the right-side pane, find the keys?RegisteredOwner?and?RegisteredOrganization. Double-click on them to change the names to whatever you want.To see the changes, right-click on “My Computer” and select “Properties”.Works on Windows XP, Vista and 7.6. Add Programs to Windows Startup:You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:Open the Registry Editor and navigate to the following key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOn the right-side pane, create a new “String Value” and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).Double-click on the “String Value”, in the “Value data” field add the path of the executable program that has to execute at startup.Reboot the computer to see the changes in effect.Works on Windows XP, Vista and 7.7. Add “Pin to Start Menu” Option for Folders in Windows 7 and Vista:Ever wanted to pin a folder to the start menu to gain faster access to it? Well, it is possible to add the “Pin to Start Menu” option so that you can plug your favorite folders to Start Menu. Here is a step-by-step procedure:Open the Registry Editor and navigate to:HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlersRight-click on “ContextMenuHandlers” and select New -> Key. Name the key as follows:{a2a9545d-a0c2-42b4-9708-a0b2badd77c8}Now, whenever you want to add a folder to Start Menu, hold down the?Shift?key and right-click on the folder. You should see the “Pin to Start Menu” option in the context menu”.8. Disable “Aero Shake” in Windows 7:One of the new additions to Windows 7 is the “Aero Shake” feature using which it is possible to grab a window using its title bar and shake it. This will minimize all the other open windows if any. It is really a handy feature! However, if you ever wanted to disable this feature, here is a solution:Open the Registry Editor and navigate to the following key:HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNow, right-click on “Windows” key and create a new Key called?Explorer.Right-click on the “Explorer” key and create a new “DWORD” called?NoWindowMinimizingShortcutsand set its value to?1.Close the Registry Editor and reboot the computer to see the changes in effect.I hope you enjoyed this post. Try the registry hacks and share your experiences.Steps to Write-Protect Your USB Drive:This can be?done by adding a small entry to the?Windows registry which acts as a switch?that can be enabled to make use of the write protection or disabled to allow write access. Here we go:Open the?Registry Editor?(Open the “Run” dialog box, type?regedit?and hit “Enter”).Navigate to the following Registry key:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Create a New Key named as?StorageDevicePolicies. To do this, right-click on?Control, again click on New ->?Key?and name it as?StorageDevicePolicies.Now right-click on??StorageDevicePolicies?and create a New ->?DWORD (32-bit) Value?and name it asWriteProtect.Double-click on?WriteProtect?and set the?Value data?to?1.Now the right-protection for USB drives?is enabled on your computer (no restart required)?and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.To revert and remove the write-protection, all you need to do is just change the?Value data?for?WriteProtect(Step-5) from?1?back to?0.?Now write access to all the USB devices is re-enabled.Sometimes it?may seem difficult to remember and follow the above mentioned steps each time you want to?enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is?USB Write Protect?byNaresh Manadhar.Using this tool, you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link:USBWriteProtectI hope you’ve now understood how to enable or disable write-protection of USB devices on your computerHow to Change the Logon Screen Background in Windows 7HOW-TO GUIDES,?WINDOWS HACKS| Posted by? HYPERLINK "" Srikanth Ramesh40 CommentsHow would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to change the Windows 7 logon screen and set your own picture/wallpaper as the background.Customizing the logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well, here is a step-by-step instruction to change the logon screen background:The image you need to set as the logon screen background should?be a?.jpg?file and?its size should not exceed?245KB.The image resolution can be anything of your choice. However I prefer?1440 x 900?or?1024 x 768. You can use any of the photo editing software such as Photoshop to?compress and set the resolution for?your image. Once you’re done, save this image as?backgroundDefault.jpg.You will need to copy this image to the following location:C:\Windows\system32\oobe\info\backgroundsYou will need to create that path if it does not?already exist on your computer.Now, open the?Registry Editor?(Start -> Run -> Type?regedit) and navigate to the following key:HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\BackgroundIf the key?Background?does not exist, then right-click on?LogonUI, select?New?->?Key, and then name it as?Background.Now locate?OEMBackground?(listed on the right side). If it does not exist, right-click?Background?and select?New?->?DWORD?and name it?OEMBackground.Double-click on?OEMBackground?and set the Value Data to?1.Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to?0.Using a Tool to Change the Logon Screen Background:The above steps will give you a detailed instruction on how to change the logon screen background manually. However, there is a nice tool to completely automate the above steps so that you can do everything with just a few mouse clicks!The tool is called?Windows 7 Logon Background Changer?from?Julien-. This small tool is very easy to use and contains a set of preloaded images to choose from or you can set your own desired image as the logon screen background.I hope you love this post! Pass your comments. Cheers?How to Hack Windows Administrator PasswordHOW-TO GUIDES,?PASSWORD HACKING,?WINDOWS HACKS| Posted by? HYPERLINK "" Srikanth Ramesh53 CommentsThis post will show you how to?hack Windows administrator password?at times when you forget it or when you want to gain access to a computer for which you do not know the password.Most of us have experienced a situation where in we need to gain access to?a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to log in to the computer. So, if you are somewhat in a same kind of situation, here is an excellent hack?using which you can reset?the password or make the password?empty (remove the password) so that you can gain?administrator access to the?computer.Hacking the Windows Admin Password:You can do this with a small tool called ? HYPERLINK "" \t "_blank" Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features:You do not need to know the old password to set a new one.This tool can detect and?unlock?locked?or?disabled?out user accounts!There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.How it Works?Most Windows operating systems stores the login passwords and other encrypted passwords in a file calledsam?(Security Accounts Manager). This file can be usually found in?\windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active.?Hence, it is necessary that you boot off?your computer and access this?sam?file via the boot menu. This tool intelligently?gains access to this file and will reset/remove the password?associated with administrator or any other account.The download link?for both CD and?floppy drives?along with the complete instructions is given below:Offline NT Password & Reg Editor DownloadIt is recommended that you download the CD version of the tool since the floppy drive is outdated or doesn’t exist in today’s computer. After the download, you’ll get a bootable image which you need to burn it onto a blank CD. Now, boot your computer from this CD and follow the screen instructions to reset the password.Another Simple Way to Reset Non-Administrator Account Passwords:Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task:Open?the command prompt (Start -> Run -> type?cmd?-> Enter)Now type?net user?and hit EnterNow the system will show you a list of user accounts on the computer. Say for example, you need to reset the password of the account by name?John, then do as follows:Type?net user John *?and hit Enter. Now, the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.So, in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.How to Repair Windows Registry the Easy WayHOW-TO GUIDES,?WINDOWS HACKS| Posted by? HYPERLINK "" Srikanth Ramesh22 CommentsThis article?explains how to inspect and?repair the registry errors?in your Windows PC so as to?improve?its overall?performance. If you are a Windows user, you are most likely to be aware of the fact that the Windows registry gets corrupted over time?resulting in an overall?decreased performance?of the computer.At times, registry errors can also make?your PC to freeze down and hang up every now and then causing a serious annoyance to the users. At this point, the registry needs a serious repair to bring the PC back to its life. Well, before I tell you how to repair the registry, lets see what causes the?registry to get corrupted.Registry errors may occur due to installing too many applications/software programs from time to time without verifying the publishers. This may create invalid entries in the registry hive leading to the errors. With the Internet boom and the era of freeware with free downloads,?people often?install programs from untrusted sources?which results in a serious damage to the registry. Since the registry is a crucial component of the Windows operating system, damage to this can cause the system performance to drop down significantly.Repairing the Corrupt Windows Registry: The Easy WayThe best and the easiest way to do this is by using a Registry Repair Tool (Registry Cleaner).?This program will automatically scan the registry of your PC to find invalid entries and will fix them by removing the errors with in no time. A registry cleaner is the simple and safest solution to?fix registry errors without the need to re-install?the Windows.Which Registry Cleaner is the Best?Well, today there exists hundreds of Registry repair tools on the market and as a result, people often get confused at which one to go far. Hence, when it comes to the choice of Registry repair tool, we must be very selective since not all of them are the same.On the Internet, there exists many such tools which are simply useless and doesn’t?apply any significant fixes to the Windows registry.?After trying many such useless products on my PC, I finally found one good product which actually made a magic to my PC performance. It is:RegCure Pro?– Boost Your PC SpeedRegCure Pro?is one of the best and award winning registry cleaner tool that?repairs registry to avoid?PC errors such as?unwanted shutdown, freezing, crashing and more.?This tool will:Repair the registry and increases your PC performance by upto 70%Fix DLL errors and invalid shortcutsFree up virtual memory to avoid error messagesPerforms?Defragmentation and Compression?of the registryFix blue screen errors, system crashes, startup errors and more…RegCure Pro?is not just a Registry cleaner, rather it is a complete Optimization Toolkit for your PC. For more information on this program, you can visit the? HYPERLINK "" \t "_blank" RegCure Pro Homepage.Can I Manually Repair the Registry?Windows registry has a very complex structure with?hundreds of thousands of entries embedded in it. A corrupt registry may contain thousands of invalid entries and errors in it as a result of which, it is impractical and almost impossible to manually inspect, find and repair those errors. Also, manual registry repair involves serious risk and?can?lead to a total system breakdown if done improperly.?Except you are a?highly experienced Windows user or a Windows expert, you are not encouraged to tamper with the registry.Hence, using a Repair tool is the?safest and the easiest way to repair the registry errors and improve the overall performance of your PC. It is recommended that you periodically (daily or weekly) perform registry scans using these tools to?repair the errors as and when they come up?so that, you can?keep your PC’s health at its best.?Just repairing the Windows registry can make your PC blazing?fast like never beforeBlock or Redirect Unwanted Websites Using HOSTS FileINTERNET SECURITY,?NETWORK HACKS| Posted by? HYPERLINK "" Srikanth Ramesh78 CommentsThe?hosts file?is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the?hosts?file to block?annoying ads, pop-ups, banners, porn sites, or even redirect one website to another.In this post I will show you how to play around with the?hosts?file to accomplish some of the above mentioned jobs.What is a hosts File?The?hosts?file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses.In other words, when you type “” on your browser’s address bar, your computer will look for thehosts?file to see if it contains the?corresponding?IP address for the domain name you typed (). In case if no entry is present in the?hosts?file, the request is then passed on to the DNS (Domain Name System) server to obtain the IP address.hosts File vs. DNSWhen it comes to resolving the hostnames, the?hosts?file is given the first priority over the Domain Name System.?In most cases, the?hosts?file remains unconfigured on the operating system and hence the DNS is used by the computer to resolve the domain names to their?corresponding?IP addresses.However, if the?hosts?file is found to contain a valid entry for a given hostname or domain name, then this is picked up and used by the operating system.Where is the hosts File Located?Windows:?In case of the Windows operating system, the?hosts?file is located at:%systemroot%\system32\drivers\etc\hostsNOTE:?In most cases this should be:?C:\Windows\System32\drivers\etc\hostsUnix/Linux:?In case of Linux it is located at:/etc/hostsHow to Block a Website?To block a specific website, all you have to do is just add a new entry for that site in the?hosts?file. I would prefer to backup the original file and create a new one instead of modifying it. So, if something goes wrong, you can just delete it and restore the original one! Well, here is a step-by-step procedure on how to create a new?hostsfile on Windows:Go to “My Computer” and you should see the “Menu bar” on top. In case of?Vista?and?Win 7, just click “Alt” to unhide the “Menu bar”.Now in the menu bar, click on “Tools -> Folder Options”. In the “View” tab?uncheck?the option that says: “Hide extensions for known file types” and click on “OK”.Open a new text pad (New Text Document.txt) and rename it to:?hosts. You will get a pop-up message with a warning. Just click on “Yes”.Please note that the renamed file?hosts?should not have any extension?such as?hosts.txt.Open the?hosts?file using the notepad. Now let us assume that you want to block the sites?Facebook?andYoutube?on your computer. For this all you have to do is add the following lines to your?hosts?file:127.0.0.1???????127.0.0.1???????127.0.0.1???????127.0.0.1???????Each entry should be placed on an individual line. The IP address and the hostname should be separated by a space or a tab. In this way, you can block any given website by just pointing it to the IP address 127.0.0.1.Navigate to?%systemroot%\system32\drivers\etc. Here you should see the original?hosts?file, rename it to?hosts_bak. Just copy and paste the new?hosts?file that you have created. That’s it. You’ve now successfully blocked those websites from loading on your computer.If you are using Vista/Win 7 you may have to?take ownership?of the original?hosts?file before renaming it.How to Redirect a Website?Suppose you want to redirect??to?, all you have to do is just add the following lines to your?hosts?file:74.125.236.72???????74.125.236.72???????Here?74.125.236.72?is the IP address of . To find out the IP address of any given website, just go to command prompt and ping it. For example:?ping . You should get a ping response that displays the IP address as shown below:From now on, whenever you type “” on your browser, you will be redirected to “”.How does a hosts File work?Whenever you block a website using the?hosts?file, you point it to the IP address?127.0.0.1?which in fact is the IP address of your own computer. In other words, the IP 127.0.0.1 points to your own computer and doesn’t exist outside.So, whenever you type the URL of a website for which an entry is present in the?hosts?file, your computer will load the IP as 127.0.0.1 instead of the actual one and tries to establish a connection with this IP address (127.0.0.1) but fails. As a result the website doesn’t load at all.The redirection of the website works by pointing the domain name of one website to the IP address of another website (as configured by the?hosts?file) instead of its original IP address. So, whenever you type , it is pointed to ’s IP address and thus, the Google page loads up instead of the actual page from .How to Block the Annoying Ads?I have found a great solution to keep all the annoying ads, banners, pop-ups and other parasites at bay by using a pre-configured?hosts?called?MVPS?hosts?file. This?hosts?file contains a long list of entries to block all those annoying ads and pop-ups that usually load while you are surfing the Internet. You can also receive regular updates on this to stay up-to-date. You can download MVPS hosts file from the link below:Download MVPS hostsIf you are playing around with the?hosts?file and something goes wrong, just delete the?hosts?file itself and rename the original file from?hosts_bak?to?hosts. This should bring back everything to normal. I hope this post on?hosts file?will help you block unwanted websites on your computer. How to Create a Virus to Block WebsitesHOW-TO GUIDES,?PROGRAMMING| Posted by? HYPERLINK "" Srikanth Ramesh65 CommentsMost of us are familiar with the virus that used to block Orkut and Youtube websites. If you are curious about creating such a virus on your own, here is how it can be done.As usual I am using my favorite programming language?‘C’?to create this?website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.This virus has been exclusively created in?‘C’. So, anyone with a basic knowledge of ‘C’ will be able to understand the working of this virus program. When this program is executed, it will block all those websites that are listed in the source code. In the following example, the sites that are listed in the source code are Google, Yahoo and Youtube. When you download the source code of this program, you have a choice to include your own list of sites that you want this virus to block.I have just removed the source code of this program from this post as it is lengthy and makes the post look messy. You can still download the source code of this virus program from the following link:Download Block_Site.rarHow Virus Program Works?The Windows operating system maintains a special file called HOSTS which can be used to block any given hostname or domain name (website) by adding new entries onto it. This program works by modifying the HOSTS file by adding new entries of those sites that are intended to be blocked. The HOSTS file is located at:%windir%\system32\drivers\etc?(Usually: C:\windows\system32\drivers\etc)So, when you execute this program, all it does is add the entries of the list of those sites (mentioned in the source code) to this HOSTS file. Once this is done, the site will be blocked from your computer. So, none of the browsers would be able to load those sites on your computer.For more information on HOSTS file, I recommend reading my other post on?How to use HOSTS file to block websites.Now, as far as the technical part of this program is concerned, people who have a working knowledge of ‘C’ should be easily able to understand the working of this virus program. However, for those who are new to ‘C’ programming, here is the algorithm of this program:Determine the Root drive. ie: Find the drive (C:, D:, E: or F:) on which the Windows is installed.Navigate to: %windir%\system32\drivers\etcOpen/Load the HOSTS file.Copy a list of those websites that are mentioned in the ARRAY to the END of the file.Save the file and Exit.How to Compile the Source Code?For a step-by-step compilation?guide, refer my post:?How to compile C Programs?Testing the Virus:To test, run the compiled module. It will block the sites that are listed in the source code.Once you run the file?block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.To remove the virus type the following command in the?Run.%windir%\system32\drivers\etcThere, open the file named “hosts” using the notepad. At the bottom of the opened file you’ll see something like this:127.0.0.1 Delete all such entries which contain the names of blocked sites.How to Make An Invisible Password Protected FolderHOW-TO GUIDES,?WINDOWS HACKS| Posted by? HYPERLINK "" Srikanth Ramesh52 CommentsDo you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by other users of your PC? Well, here is a way to do that.In this post, I will show you how to make an?invisible password protected folder?in Windows without using any additional software.How to Create a Password Protected Folder?Here is is step-by-step procedure to do this:Step-1:?Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as?ABC.Step-2:?Now, in this folder place all the important files, documents or any folders that you want to password protect.Step-3:?Right-click on this folder (ABC) and select the option?Send To?->?Compressed (zipped) Folder.Step-4:?Now a new compressed zipped folder gets created next this folder (ABC) with the same name.Step-5:?Double-click on this compressed zipped folder and you should see your original folder (ABC)?here.Step-6:?Now go to the?File?menu and select the option?Add a password?(File?->?Add a password)Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus ,you have now created the password protected folder.How to Make the Folder Invisible?Step-1:?Right-click on this password protected folder and select?Properties.Step-2:?At the bottom select the?option?Hidden?and press?OK. Now your folder gets invisible (hidden).Step-3:?In order to unhide this folder, go to?My Computer?->?Tools?->?Folder options. Switch to View tab, scroll down and under?Hidden files and folders?you’ll see the following two options:Do not show hidden files and folders.Show hidden files and folders.Select the second option and press OK. Now the invisible folder becomes visible in its location. To access it you need the password. To make it invisible again, repeat step -1 through step-3 and select the first option and click OK. Now, the folder becomes invisible once again.I hope that you’ve now understood how to create an invisible password protected folder in Windows. If you like this post, pass your comments! Cheers?A Virus Program to Disable USB PortsPROGRAMMING,?WINDOWS HACKS| Posted by? HYPERLINK "" Srikanth Ramesh43 CommentsIn this post, I will show how to create a simple virus that?disables the?USB portson the computer (PC). As usual, I am using my favorite C programming language to create this virus. Anyone with a basic knowledge of C language?should be able to understand the working of this virus program.Once this virus is executed it will?immediately?disable all the USB ports on the computer. As a result you’ll will not be able to use?your pen drive or any other USB peripheral devices on?the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.Download the source code of the virus program on to your computer from the following link:Download the USB_Block.rarThe download contains the following 2 files:block_usb.c (source code)unblock_usb.c (source code)You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post -?How to Compile C Programs.3. Upon compilation of block_usb.c you get?block_usb.exe?which is?a simple?virus that will block (disable) all the USB ports on the computer upon execution (double click).To test this virus, just run the?block_usb.exe?file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run theunblock_usb.exe? (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post –?How to Change the ICON of an EXE file?(This step is also optional).How it Works?The idea behind the working of this virus is pretty straightforward. It works by gaining access to the Windows registry and modifying its settings to disable the USB device support on the computer.On the other hand, the other program will re-set the registry settings back to the normal so that the support for USB devices is re-enabled. I hope you like this post. Please pass your comments.How to Make a Trojan HorseHOW-TO GUIDES,?PROGRAMMING| Posted by? HYPERLINK "" Srikanth Ramesh81 CommentsMost of you may be curious to know about?how to?make a Trojan?or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you?how to?make a simple trojan?on your own using the C programming language.This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run.So, I’ll call this as Space Eater Trojan. Since this program is written using?a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download?at the end of this post.?Let’s see how this trojan works:Before I move on to explain the working of this program, you need to know?what exactly is a Trojan horseand how?it works. Unlike what many of us think, a trojan horse is not a virus.?In simple words, it is just a program that appears to do a?favorable?task but in reality performs undisclosed malicious functions that allow the attacker to gain unauthorized access to the host machine or cause a damage to the computer.Now let’s move on to the working of our Trojan:The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result, the the root drive gets filled up completely with in minutes of running this program.Once the disk space is full, the trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any of the cleanup program. This is because, the trojan intelligently creates a huge file in the?Windows\System32?folder with the?.dll?extension. Since the junk file has the?.dll?extension it is often ignored by the disk cleanup software. Hence there is now way to recover the hard disk space other than reformatting the drive.The algorithm of the Trojan is as follows:Search for the?root drive.Navigate to?%systemroot%\Windows\System32?on the root drive.Create the file named “spceshot.dll“.Start?dumping the junk data?onto the above file and keep increasing its size until the drive is full.Once the drive is full,?stop the process.You can?download?the Trojan source code?HERE. Please note that I have not included the executable for security reasons. You need to compile it to obtain the executable.How to compile the program?For step-by-step compilation?guide, refer my post?How to compile C Programs.How to test this trojan horse?To test the trojan, just run the?SpaceEater.exe?file on your computer. It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space.NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.How to fix the damage and free up the space?To remove the damage and free up the space, just type the following in the “run” dialog box:%systemroot%\system32Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.?NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post:?How to Change the ICON of an EXE file ?Please pass your comments and tell me your opinion. I am just waiting for your comments.?Customize Google to Improve Search ResultsGOOGLE HACKS| Posted by? HYPERLINK "" Srikanth Ramesh16 CommentsGoogle is undisputedly the best search engine out there on the Internet, however there are?a few ways by which you can?customize Google?and make it even better.I have got 3 best free?Firefox extensions using which?you can customize Google by adding?extra useful?information?to your search results and?remove unwanted information?like ads, spam and click tracking so as to?improve the?overall searching experience. The following are the 3 best extensions for Firefox using which you can improve?the?search results.1. OptimizeGoogle:Using?OptimizeGoogle, you can?get rid of text ads?from Google search results, add links from about 10 other search engines, add?position counter, product results and more. You can even filter your search results to see dead websites (using? HYPERLINK "" \t "_blank" WayBack Machine)?and?remove click tracking?so that you can search anonymously. Here is a list of some of the other useful features of this plugin:Use Google suggest (get word suggestion while typing)Add more security by using https wherever necessaryFilter spammy websites from search results pageOption to remove SideWikiAdd links to bookmark your favorite resultAdd links to other news and product search sitesTo install the plugin, just visit the? HYPERLINK "" \t "_blank" OptimizeGoogle?page from your Firefox browser and click on the?Download button. Once installed, you can?enable or disable the customization options from the?Tools -> OptimizeGoogle Options.After you customize Google to improve the search results, how about adding a feature that provides a way to preview the website in the search results itself? Here is a miracle?Firefox?extension to this job for us.2. ?SearchPreview:SearchPreview (formerly GooglePreview)?will?insert thumbnail view?of the web page into the Google search results page itself so that you can take the guess work out of clicking a link. Just install the plugin, reload Firefox and you will have the SearchPreview at work. You can install this plugin from the following link:SearchPreview DownloadOptimizeGoogle and SearchPreview have made our search results smarter and faster. Now how about safer? Well you have another Firefox plugin?to make your search results safer as well. Here we go.3. McAfee SiteAdvisor:This is a free browser plugin that gives safety advice about websites on the search results page?before you actually click on the links. After you install the SiteAdvisor plugin, you will see a small rating icon next to each search result, which will alert you?about suspicious/risky websites?and help you find safer alternatives. These ratings are derived based on various tests conducted by McAfee.Based on?the quality of links, SiteAdvisor may display?Green, Yellow, Red or Grey icon next to the search results. Green means that?the link is completely safe, Yellow means that there is a minor risk, Red means a major risk and Grey means that the site is not yet rated. These results will guide you to Web safety.SiteAdvisor works on both Internet Explorer and Firefox which you can download?from the following link:Download McAfee SiteAdvisorHere is a snapshot of all the?3 plugins at work:I hope you enjoy these?3 plugins which make your searching experience a lot more simpler and safer.A Virus Program to Restart the ComputerPROGRAMMING| Posted by? HYPERLINK "" Srikanth Ramesh79 CommentsIn this post, I will show you how to create a?virus to restart the computer?at every startup. That is, upon infection, the computer will get restarted every time the system is booted. As a result, the computer will become inoperable as it reboots again as soon as the desktop is loaded.For this, the virus needs to be executed only once and from then on, it will carry out rest of the operation on its own. I have programmed this virus using the C language. If you are familiar with the?C language?then it is too easy to understand the logic behind the coding. The code is not posted here in this article, but you can download it from the link piling the source code into an executable module:Download the?Source Code Here.UnRar the file and you should see the source code: Sysres.CFor a step-by-step compilation?guide, refer my post:?How to compile C Programs?Testing and removing the virus from your PC:You can compile and test this virus on your own PC without any fear. To test, just double-click the?sysres.exefile and restart the system manually. From now on, every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by following the below mentioned steps:Reboot your computer in the?safe mode.Go to:%systemroot%\Windows\System(%systemroot%?can be C,D,E or F)You will find a file by name?sysres.exe, delete it.Type?regedit?in?run. You will go to the registry editor. Here navigate to:HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\RunThere, on the right site you will see an entry by name “sres“. Delete this entry. That’s it. You have now removed this virus successfully.Logic Behind the working of this virus program:If I do not explain the logic(Algorithm) behind the working of the virus program, I think this post would become an incomplete one. So I’ll explain the logic in a simplified manner without getting much into the technical aspects of the program. If you have further doubts, you can pass your comments.LOGIC:First the virus will find the Root partition (Partition on which Windows is installed).Next, it will determine whether or not the virus file (sysres.exe) is already copied into%systemroot%\Windows\System.If not it will just place a copy of itself into?%systemroot%\Windows\System?and makes a registry entry to put this virus file into the Windows startup.Or else if the virus is already found in the?%systemroot%\Windows\System?directory (folder), then it just gives a command to?restart?the computer.This process is repeated every time the PC is restarted.NOTE:?The system will not be restarted as soon as you double click the?Sysres.exe?file.The restarting process will occur from the next boot of the system.How to change the icon of the executable module (This step is optional):After you compile, the?sysres.exe?file that you get will have a?default icon. If you send this file to your friends they may not execute it since it has a default ICON. So it is possible to change the ICON of this?Sysres.exe?file into any other ICON that is more trusted and looks attractive.For example, you can change the icon into?Norton antivirus?ICON itself so that the people seeing this file believes that it is?Norton antivirus. Or you can change its ICON into the ICON of any popular or trusted programs so that people will definitely click on it.How to Use Google for HackingGOOGLE HACKS,?HOW-TO GUIDES| Posted by? HYPERLINK "" Srikanth Ramesh78 CommentsGoogle serves almost 80 percent?of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites.?The following are some of the?ways to use Google for hacking:1. Using Google to Hack Security Cameras:There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic?etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. For this, all you have to do is just use the following search query in Google. Type in the Google search box exactly as given below and hit enter:inurl:”viewerframe?mode=motion”Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows:As you can see in the above screenshot, you now have access to the?Live cameras?which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a?less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. In order to access them, just use the following search query:intitle:”Live View / – AXIS”Now, click on any of the search results to access a different set of live cameras. Thus, you have hacked Security Cameras using Google.2. Using Google to Hack Personal and Confidential Documents:Using Google, it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their?Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”You can gain access to a list of .xls files (excel documents) which contains contact details including email addresses of large group of people. To do so, type the following search query and hit enter:filetype:xls inurl:”email.xls”Also, it is possible to?gain access to the documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query:intitle:index.of finances.xls3. Hacking Google to Gain Access to Free Stuffs:Ever wondered how to hack Google for free music or eBooks. Well, here is a way to do that. To download free music, just enter the following query on Google search box and hit enter.“?intitle:index.of?mp3?eminem“Now, you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.I hope you enjoy using Google for hacking stuffs on the Internet. If you’ve liked this post, please pass your comments. Cheers! ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download