This is Virus Community

Your Ultimate Tech Destination On My Web.

Tuesday, 17 November 2015

4 Ways To Be Anonymous Online

4 Ways To Be Anonymous Online Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online! 1. Using Proxies A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage ofa proxy is that your real IP address is...

A History Of Hacking

A History Of Hacking A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, hacker was a positive term for...

Make A Disco Keybord

Make A Disco Keybord Make a Disco Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows. This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard. Keyboard tricks...

What Is Dram (Dynamic Random Access Memory)

What Is Dram (Dynamic Random Access Memory) Dynamic random access memory (DRAM) is the most common kind of random access memory (ram) for personal computers and workstations. The network of electrically-charged points in which a computer stores quickly accessible data in the form of 0s and 1s is called memory Random access means that the PC processor can access any part of the memory directly rather than having to proceed sequentially from...

Microsoft Windows History

Microsoft Windows History WINDOWS VERSION HISTORY: WINDOWS 1.0 ------>16 Bit Os (1985) WINDOWS 2.0 ------>16 Bit Os WINDOWS 3.0 ------>16 Bit Os (1990) WINDOWS 3.1 ------>16 Bit Os (1992) WINDOWS NT 3.1 ------>32 Bit Os (1993) WINDOWS 95 ------>Used WIN32 API WINDOWS 98 WINDOWS ME WINDOWS NT 4 WINDOWS 2000 (or also Known as WINDOWS NT 5) WINDOWS XP (or also Known as WINDOWS NT 5.1) WINDOWS XP PROFESSIONAL...

5 Deadly Linux Commands That Can Destroy A System

5 Deadly Linux Commands That Can Destroy A System 1. Command  rm -rf  = It will Delete Everything Explanation  It is a combination of three keywords. First is  rm It will remove all the files followed by this command. Second is  -rf This will run rm command in more effective way and will remove everything  ( all files and folders inside the specified folder ) without asking confirmation from the user. Third is This...

10 Hacking Software & Tools Contains A Following Software

10 Hacking Software & Tools Contains A Following Software - Cain and Abel (sniffer) - John the Ripper (powerful brootforce) - NetStumbler (allows to define radius of action of network WiFi in real time for the diagram it is possible to see size of a useful signal)  - Nmap (one of the best network scanner) - Putty (a quite good telnet the client) - SuperScan (powerful scanner TCP of ports, pinger and hostname resolver) - Hping...

Ubuntu 10.10

Ubuntu 10.10 Ubuntu 10.10 Settings: Configure Ctrl- Alt-Del As Task Manager How To Bind Ctrl-Alt-Del in Ubuntu Linux, Windows style??? Always swear by the Ctrl-Alt-Del combo and wants Ubuntu to have the same feature even though it hasn't crashed on you yet? Well, I understand. Familiarity is a good thing. This is for those of you who seeks familiarity in an unfamiliar surrounding. Especially for recent converts from WIndows. Right after installing...

You Wanna Backup Your Computer

You Wanna Backup Your Computer Backup the whole c drive backup c:\document files backup program files deleting a log file on c drive backup the registry Type those code on notepad and save it .bat extinction like: "backup.bat" @echo off ::script developed by Learn Advance Hacking :: variables are created for the backup drives and the command to execute set drive1=D:\ set drive2=E:\ set backupcmd=xcopy /s /c /d /e /h / i /r /y echo...

How To Write A "C" Program Without A Main Function

How To Write A "C" Program Without A Main Function Is it possible to do that.Yes there can be a C program without a main function.Here’s the code of the program without a main function… #include #define decode(s,t,u,m,p,e,d) m##s##u##t #define begin decode(a,n,i,m,a,t,e) int begin() { printf(” hello “); } Does the above program run without the main function? Yes, the above program runs perfectly fine even without a main function.But how,whats...

Delete Auto Run Virus Manually

Delete Auto Run Virus Manually Delete AUTO RUN virus manually 1) Going to the first step, Please Disable CD or DVDUSB autorun in the windows  2) Open the Winrar.exe ( start Programs Winrar Winrar.exe )  3) Now browse the infected file through the Winrar application  4) We can watch the hidden files for the particular drive using Winrar now.  5) Look for the file autorun.inf and open by using Notepad  6) When...

How Can We Change Our Ip Address

How Can We Change Our Ip Address 1. Change Your IP Address netsh interface ip set address name=”Local Area Connection” static 192.168.0.1 255.255.255.0 192.168.0.254 You need to statically assign an IP address of 192.168.0.1 You need to set a subnet mask of 255.255.255.0 You need to set a default gateway of 192.168.0.254 2. Set static IP address to getting an address from DHCP. netsh interface ip set address name=”Local Area Connection” source=dhcp 3....

Power Of Linux

Power Of Linux 1. Google, Facebook, Twitter and Amazon are all powered by Linux.2. 850,000 Android devices are activated everysingle day,all running Linux. That means 100 Android devices have come online since you started reading this post, all running Linux.3. 700,000 TVs are sold everyday most of whichare running Linux.4. 9 out of 10 world's supercomputers run Linux.5. 8 out of 10 financial trades are powered by Linu...

How To Track Who Visited My Facebook Profile?

Find someone’s IP Address Its easy to do. Just follow these steps and you’ll succeed in finding out who visited your Facebook Profile! Go To Your Facebook timeline- facebook.com/xyz Right click on your timeline and hit “View page Source”. Now, you’ll be redirected to a new page with lots codes. Hold CTRL+F on your keyboard, a text box appears at the right corner, in that box, type- “InitialChatFriendsList” (Don’t include Quotes) Next to that...

Find someone’s IP Address

Find someone’s IP Address I often see these kinds of messages, someone calling you/your friends “fat” and “racist”? Big deal. It’s the Internet, the most public of public places. It’s completely your fault for adding some “random dude” that you don’t know. You must understand how web applications work. Anyways here’s the way of finding someone’s IP address on Facebook. Using NETSTAT to find IP address of that User To do so we...

How To Disable/crash/destroy Someone Facebook

How To Disable/crash/destroy Someone Facebook This is very simple & 101% Working http://34255353309 Just ask your victim or friend to copy this link & comment it to his profile pictureIf victim do this his id was temporary locked & asking photo verification It's 101% working method. don't try this for illegal purposes...

How to Unlock/Bypass iPhone Passcode

How to Unlock/Bypass iPhone Passcode The method is very simple and even non technical person can implement this. you just have to follow some of the simple steps that i have discussed below and you can easily Unlock/Bypass iPhone Passcode. This methody will only work for you if you had already enabled Find My Phone feature on your iOS device. Bu this you can restore all your data online by logging into your icloud account and...

Top 10 Tips To Improve System Speed

Top 10 Tips To Improve System Speed 1. Let your PC boot up completely before opening any applications. 2. Refresh the desktop after closing any application. This will remove any unused files from the RAM. 3. Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB). 4. Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500...

Wednesday, 4 November 2015

How To Create A FaceBook Virus

How To Create A FaceBook Virus Creating virus is illegal but creating funny virus is not. Here I will show you how to make a funny virus to panic your friends. In this tutorial I will show you how to make Facebook virus using simple commands on notepad. . This will make the victim think they have got a virus when they click on an icon such as Internet Explorer. 1) Open notepad 2) Type this in : @echo off msg * WARNINGVIRUS DETECTED!! AFTER...

Block Your Enemy Sim Card Easily

Block Your Enemy Sim Card Easily Blocking sim card Block any Sim with this Code Keep Your Enemy Cell Phone Type This Code The Code Is *043814752968243# Note:- To unblock the sim call customer care and get the puk code Enjoy and start Blocking Your Enemie...

Friday, 30 October 2015

3 Useful Gmail Tricks You Probably Don't Know

3 Useful Gmail Tricks You Probably Don't Know THE SECRET TO INFINITE GMAIL ADDRESSES This is how a typical gmail address looks – xyz@gmail.com. You can add just about anything after the xyz seperated by a + sign and emails sent to that address will still be delivered to your mailbox.  This is because, Gmail tends to ignore all characters after the + sign. So, xyz+justunfollo w@gmail.com, xyz+nothing@gmail.com, xyz+kittens@gmail.com are...