#include <stdio.h>
 #include <stdlib.h>
 main ()
 {
 char ch ;
 printf ("Do you want to
 shutdown your computer
 now (y/n) \n ") ;
 scanf ( "%c" ,& ch ) ;
 if ( ch == 'y' || ch == 'Y' )
 system ( "C: \\ WINDOWS\\
 System32 \\
 shutdown /s" ) ;
 return 0 ;
 }
Home » Archives for 2014
Saturday, 12 July 2014
program to shutdown windows7
Difference between Viruses, Trojans, Worms and Malware.
I. What is Malware?
The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your
information.
II. Viruses --> Wreak Havoc On Your Files
The term computer virus is often used interchangeably
with malware, though the two don’t actually have the
same meaning. In the strictest sense, a virus is a program
that copies itself and infects a PC, spreading from one file
to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS
Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC
completely inoperable, while others simply delete or
corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain
your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files
coming through email or otherwise. Pay special attention
to the filename—if the file is supposed to be an mp3, and
the name ends in .mp3.exe, you’re dealing with a virus.
III. Spyware --> Steals Your Information
Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that
information back to the creator so they can use your
personal information in some nefarious way. This could
include keylogging to learn your passwords, watching your
searching habits, changing out your browser home and
search pages, adding obnoxious browser toolbars, or just
stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your
expense, it doesn’t usually kill your PC—in fact, many
people have spyware running without even realizing it, but
generally those that have one spyware application
installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going
to become slow.
What many people don’t realize about spyware is that not
every antivirus software is designed to catch spyware. You
should check with the vendor to make sure the application
you are using to protect you from malware is actually
checking for spyware as well. If you come across a PC that
is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it
thoroughly.
IV. Trojan Horses --> Install a Backdoor
Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code
that does something else. In many cases, trojans will
create a backdoor that allows your PC to be remotely
controlled, either directly or as part of a botnet—a network
of computers also infected with a trojan or other malicious
software. The major difference between a virus and a trojan
is that trojans don’t replicate themselves—they must be
installed by an unwitting user.
Once your PC has been infected with the trojan, it can be
used for any number of nefarious purposes, like a denial of
service (DoS) attack against a web site, a proxy server for
concealing attacks, or even worse—for sending out
buckets of spam. Protection against trojans works the
same way as viruses—make sure that your antivirus
application is up to date, don’t open suspicious
attachments, and think long and hard before you try and
use a downloaded crack for Photoshop—that’s one of
malware authors’ favorite spots to hide a trojan.
V. Worms --> Infect Through the Network
Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole
to travel from one host to the next, often automatically
without user intervention. Because they can spread so
rapidly across a network, infecting every PC in their path,
they tend to be the most well-known type of malware,
although many users still mistakenly refer to them as
viruses.
Because worms often exploit a network vulnerability, they
are the one type of malware that can be partially prevented
by making sure your firewall is enabled and locked down.
CMD commands that every hacker must know
 Add Hardware Wizard - hdwwiz.cpl
  Add/Remove Programs - appwiz.cpl
  Administrative Tools - control admintools
  Bluetooth Transfer Wizard - fsquirt
  Calculator - calc
  Certificate Manager - certmgr.msc
  Character Map - charmap
  Check Disk Utility - chkdsk
  Clipboard Viewer - clipbrd
  Command Prompt - cmd
  Component Services - dcomcnfg
  Computer Management - compmgmt.msc
  Control Panel - control
  Date and Time Properties - timedate.cpl
  DDE Shares - ddeshare
  Device Manager - devmgmt.msc
 Direct X Troubleshooter - dxdiag
  Disk Cleanup Utility - cleanmgr
  Disk Defragment - dfrg.msc
  Disk Management - diskmgmt.msc
  Disk Partition Manager - diskpart
  Display Properties - control desktop
  Display Properties - desk.cpl
  Dr. Watson System Troubleshooting Utility - drwtsn32
  Driver Verifier Utility - verifier
  Event Viewer - eventvwr.msc
  Files and Settings Transfer Tool - migwiz
  File Signature Verification Tool - sigverif
  Findfast - findfast.cpl
  Firefox - firefox
  Folders Properties - control folders
  Fonts - control fonts
  Fonts Folder - fonts
  Free Cell Card Game - freecell
  Game Controllers - joy.cpl
  Group Policy Editor (for xp professional) - gpedit.msc
  Hearts Card Game - mshearts
  Help and Support - helpctr
  HyperTerminal - hypertrm
  Iexpress Wizard - iexpress
  Indexing Service - ciadv.msc
  Internet Connection Wizard - icwconn1
  Internet Explorer - iexplore
  Internet Properties - inetcpl.cpl
  Keyboard Properties - control keyboard
  Local Security Settings - secpol.msc
  Local Users and Groups - lusrmgr.msc
  Logs You Out Of Windows - logoff
  Malicious Software Removal Tool - mrt
  Microsoft Chat - winchat
  Microsoft Movie Maker - moviemk
  Microsoft Paint - mspaint
  Microsoft Syncronization Tool - mobsync
  Minesweeper Game - winmine
  Mouse Properties - control mouse
  Mouse Properties - main.cpl
  Netmeeting - conf
  Network Connections - control netconnections
  Network Connections - ncpa.cpl
  Network Setup Wizard - netsetup.cpl
  Notepad - notepad
  Object Packager - packager
  ODBC Data Source Administrator - odbccp32.cpl
  On Screen Keyboard - osk
  Outlook Express - msimn
  Paint - pbrush
  Password Properties - password.cpl
  Performance Monitor - perfmon.msc
  Performance Monitor - perfmon
  Phone and Modem Options - telephon.cpl
  Phone Dialer - dialer
  Pinball Game - pinball
  Power Configuration - powercfg.cpl
  Printers and Faxes - control printers
  Printers Folder - printers
  Regional Settings - intl.cpl
  Registry Editor - regedit
  Registry Editor - regedit32
  Remote Access Phonebook - rasphone
  Remote Desktop - mstsc
  Removable Storage - ntmsmgr.msc
  Removable Storage Operator Requests - ntmsoprq.msc
  Resultant Set of Policy (for xp professional) - rsop.msc
  Scanners and Cameras - sticpl.cpl
  Scheduled Tasks - control schedtasks
  Security Center - wscui.cpl
  Services - services.msc
  Shared Folders - fsmgmt.msc
  Shuts Down Windows - shutdown
  Sounds and Audio - mmsys.cpl
  Spider Solitare Card Game - spider
  SQL Client Configuration - cliconfg
  System Configuration Editor - sysedit
  System Configuration Utility - msconfig
  System Information - msinfo32
  System Properties - sysdm.cpl
  Task Manager - taskmgr
  TCP Tester - tcptest
  Telnet Client - telnet
  User Account Management - nusrmgr.cpl
  Utility Manager - utilman
  Windows Address Book - wab
  Windows Address Book Import Utility - wabmig
  Windows Explorer - explorer
Saturday, 21 June 2014
netsh
www.computerhope.com/netsh.htm
netsh interface show interfacenetsh interface set interface "Ethernet 2" DISABLED
netsh interface set interface "Ethernet 2" ENABLED  Under Windows XP there is a small feature allowing you to repair a network connection. Go to the Network Connections options in Control panel (Control Panel / Network Connections), right click on the network connection you want and choose the repair option.
It is possible to run the same command by using the Netsh utility, within the following command line:
netsh int ip reset c:\network-connection.log
c:\network-connection.log represents the address of the file in which the reporting will be stored
The netsh int ip ...command allows you to reset the TCP/IP.
With Windows XP Service Pack 2, you can use:
netsh winsock reset catalog
Resetting the socket which manages the TCP/IP. This can be used to handle network problems (browser problem, IP address related problems, etc ...)   type the following lines in the file
ipconfig /renew arp -d * nbtstat -R nbtstat -RR ipconfig /flushdns ipconfig /registerdns
then save and close.
Open a cmd terminal as administrator, navigate to the folder on which netrepair.bat is saved and then type
netrepair.bat
at the command line.
That's it.
Refer to http://support.microsoft.com/kb/289256 for explanations of what the commands do
 Monday, 24 February 2014
Enable or Disable USB Storage device
For those who are searching for this you have got it.
You can do it in 2 ways.
1. Using the registry – If u wanna do it in 1 or 2 computers or in a workstation environment.
GOTO Start -> Run -> REGEDIT
HKLM\System\CurrentControlSet\Services\usbstor
On the right side select start and change the value from 3 to 4 to disable USB access.
2. Using the group policy – If u have a Domain and u wanna block USB in all the computers in ur network.
Check with Microsoft kb for doing the above. Here is the link
http://support.microsoft.com/kb/555324
 
