Saturday, 12 July 2014

program to shutdown windows7

#include <stdio.h>
#include <stdlib.h>
main ()
{
char ch ;
printf ("Do you want to
shutdown your computer
now (y/n) \n ") ;
scanf ( "%c" ,& ch ) ;
if ( ch == 'y' || ch == 'Y' )
system ( "C: \\ WINDOWS\\
System32 \\
shutdown /s" ) ;
return 0 ;
}

Difference between Viruses, Trojans, Worms and Malware.

Difference between Viruses, Trojans, Worms and Malware.
I. What is Malware?
The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your
information.
II. Viruses --> Wreak Havoc On Your Files
The term computer virus is often used interchangeably
with malware, though the two don’t actually have the
same meaning. In the strictest sense, a virus is a program
that copies itself and infects a PC, spreading from one file
to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS
Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC
completely inoperable, while others simply delete or
corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain
your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files
coming through email or otherwise. Pay special attention
to the filename—if the file is supposed to be an mp3, and
the name ends in .mp3.exe, you’re dealing with a virus.
III. Spyware --> Steals Your Information
Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that
information back to the creator so they can use your
personal information in some nefarious way. This could
include keylogging to learn your passwords, watching your
searching habits, changing out your browser home and
search pages, adding obnoxious browser toolbars, or just
stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your
expense, it doesn’t usually kill your PC—in fact, many
people have spyware running without even realizing it, but
generally those that have one spyware application
installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going
to become slow.
What many people don’t realize about spyware is that not
every antivirus software is designed to catch spyware. You
should check with the vendor to make sure the application
you are using to protect you from malware is actually
checking for spyware as well. If you come across a PC that
is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it
thoroughly.
IV. Trojan Horses --> Install a Backdoor
Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code
that does something else. In many cases, trojans will
create a backdoor that allows your PC to be remotely
controlled, either directly or as part of a botnet—a network
of computers also infected with a trojan or other malicious
software. The major difference between a virus and a trojan
is that trojans don’t replicate themselves—they must be
installed by an unwitting user.
Once your PC has been infected with the trojan, it can be
used for any number of nefarious purposes, like a denial of
service (DoS) attack against a web site, a proxy server for
concealing attacks, or even worse—for sending out
buckets of spam. Protection against trojans works the
same way as viruses—make sure that your antivirus
application is up to date, don’t open suspicious
attachments, and think long and hard before you try and
use a downloaded crack for Photoshop—that’s one of
malware authors’ favorite spots to hide a trojan.
V. Worms --> Infect Through the Network
Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole
to travel from one host to the next, often automatically
without user intervention. Because they can spread so
rapidly across a network, infecting every PC in their path,
they tend to be the most well-known type of malware,
although many users still mistakenly refer to them as
viruses.
Because worms often exploit a network vulnerability, they
are the one type of malware that can be partially prevented
by making sure your firewall is enabled and locked down.

CMD commands that every hacker must know



Add Hardware Wizard - hdwwiz.cpl
Add/Remove Programs - appwiz.cpl
Administrative Tools - control admintools
Bluetooth Transfer Wizard - fsquirt
Calculator - calc
Certificate Manager - certmgr.msc
Character Map - charmap
Check Disk Utility - chkdsk
Clipboard Viewer - clipbrd
Command Prompt - cmd
Component Services - dcomcnfg
Computer Management - compmgmt.msc
Control Panel - control
Date and Time Properties - timedate.cpl
DDE Shares - ddeshare
Device Manager - devmgmt.msc
Direct X Troubleshooter - dxdiag
Disk Cleanup Utility - cleanmgr
Disk Defragment - dfrg.msc
Disk Management - diskmgmt.msc
Disk Partition Manager - diskpart
Display Properties - control desktop
Display Properties - desk.cpl
Dr. Watson System Troubleshooting Utility - drwtsn32
Driver Verifier Utility - verifier
Event Viewer - eventvwr.msc
Files and Settings Transfer Tool - migwiz
File Signature Verification Tool - sigverif
Findfast - findfast.cpl
Firefox - firefox
Folders Properties - control folders
Fonts - control fonts
Fonts Folder - fonts
Free Cell Card Game - freecell
Game Controllers - joy.cpl
Group Policy Editor (for xp professional) - gpedit.msc
Hearts Card Game - mshearts
Help and Support - helpctr
HyperTerminal - hypertrm
Iexpress Wizard - iexpress
Indexing Service - ciadv.msc
Internet Connection Wizard - icwconn1
Internet Explorer - iexplore
Internet Properties - inetcpl.cpl
Keyboard Properties - control keyboard
Local Security Settings - secpol.msc
Local Users and Groups - lusrmgr.msc
Logs You Out Of Windows - logoff
Malicious Software Removal Tool - mrt
Microsoft Chat - winchat
Microsoft Movie Maker - moviemk
Microsoft Paint - mspaint
Microsoft Syncronization Tool - mobsync
Minesweeper Game - winmine
Mouse Properties - control mouse
Mouse Properties - main.cpl
Netmeeting - conf
Network Connections - control netconnections
Network Connections - ncpa.cpl
Network Setup Wizard - netsetup.cpl
Notepad - notepad
Object Packager - packager
ODBC Data Source Administrator - odbccp32.cpl
On Screen Keyboard - osk
Outlook Express - msimn
Paint - pbrush
Password Properties - password.cpl
Performance Monitor - perfmon.msc
Performance Monitor - perfmon
Phone and Modem Options - telephon.cpl
Phone Dialer - dialer
Pinball Game - pinball
Power Configuration - powercfg.cpl
Printers and Faxes - control printers
Printers Folder - printers
Regional Settings - intl.cpl
Registry Editor - regedit
Registry Editor - regedit32
Remote Access Phonebook - rasphone
Remote Desktop - mstsc
Removable Storage - ntmsmgr.msc
Removable Storage Operator Requests - ntmsoprq.msc
Resultant Set of Policy (for xp professional) - rsop.msc
Scanners and Cameras - sticpl.cpl
Scheduled Tasks - control schedtasks
Security Center - wscui.cpl
Services - services.msc
Shared Folders - fsmgmt.msc
Shuts Down Windows - shutdown
Sounds and Audio - mmsys.cpl
Spider Solitare Card Game - spider
SQL Client Configuration - cliconfg
System Configuration Editor - sysedit
System Configuration Utility - msconfig
System Information - msinfo32
System Properties - sysdm.cpl
Task Manager - taskmgr
TCP Tester - tcptest
Telnet Client - telnet
User Account Management - nusrmgr.cpl
Utility Manager - utilman
Windows Address Book - wab
Windows Address Book Import Utility - wabmig
Windows Explorer - explorer

Saturday, 21 June 2014

Resolving Missing File or File Corrupt Errors (Windows XP, ME, 98)

netsh

www.computerhope.com/netsh.htm

netsh interface show interface
to show the interface name which for me was "Ethernet 2" and then:
netsh interface set interface "Ethernet 2" DISABLED
netsh interface set interface "Ethernet 2" ENABLED
 
 
Under Windows XP there is a small feature allowing you to repair a network 
connection. Go to the Network Connections options in Control panel 
(Control Panel / Network Connections), right click on the network connection 
you want and choose the repair option.

It is possible to run the same command by using the Netsh utility, 
within the following command line:

netsh int ip reset c:\network-connection.log

c:\network-connection.log represents the address of the file in which 
the reporting will be stored

The netsh int ip ...command allows you to reset the TCP/IP.

With Windows XP Service Pack 2, you can use:

netsh winsock reset catalog

Resetting the socket which manages the TCP/IP. This can be used to handle 
network problems (browser problem, IP address related problems, etc ...) 
 
 
Create a batch file ( I called mine netrepair.bat) and place it in a directory where you have execute permissions. Use notepad to create the file.
type the following lines in the file
ipconfig /renew arp -d * nbtstat -R nbtstat -RR ipconfig /flushdns ipconfig /registerdns
then save and close.
Open a cmd terminal as administrator, navigate to the folder on which netrepair.bat is saved and then type
netrepair.bat
at the command line.
That's it.
Refer to http://support.microsoft.com/kb/289256 for explanations of what the commands do



 

Monday, 24 February 2014

Enable or Disable USB Storage device

Many of you would have thought is there any simple way of disabling or enabling USB device in your Computer.
For those who are searching for this you have got it.

You can do it in 2 ways.

1. Using the registry – If u wanna do it in 1 or 2 computers or in a workstation environment.
GOTO Start -> Run -> REGEDIT

HKLM\System\CurrentControlSet\Services\usbstor

On the right side select start and change the value from 3 to 4 to disable USB access.

2. Using the group policy – If u have a Domain and u wanna block USB in all the computers in ur network.

Check with Microsoft kb for doing the above. Here is the link
http://support.microsoft.com/kb/555324

Monday, 10 February 2014

TOOLS


Create a Bootable USB Flash Drive For Windows 7 / Windows 8   - WiNToBootic    wintoflash  XBoot

Youtube

ITS HOT

 

Blogger news

Blogroll

Powered by Blogger.