This is Virus Community

Your Ultimate Tech Destination On My Web.

This is Virus Community

Your Ultimate Gadgets Destination On My Web.

This is Virus Community

Your Ultimate Technology Updates Destination On My Web.

This is Virus Community

Your Ultimate Tech Articles Destination On My Web.

This is Virus Community

Your Ultimate Virus and Malware updates Destination On My Web.

Friday, 5 February 2016

Some Library Of C, C++ Programming & It's Description

Some Library Of C, C++ Programming & It's Description

1. <stdio.h>: input and output function in program.

2. <conio.h>: to clear screen and pause information function.

3. <ctype.h>: function for testing characters

4. <string.h>: function for manipulating string

5. <math.h>: mathematical function 

6. <stdlib.h>: utility function for number, conversion, storage allocation

7. <assert.h>: function that can be used to add diagnostics to a program

8. <stdarg.h>: function that can be used to step through a list of function arguments

9. <setjmp.h>: function that can be used to avoid the normal call and return sequence

10. <signal.h>: function for handling exceptional condition that may arise in a program

11. <time.h>: function for manipulating date and time

12. <limits.h>: constant definitions for the size of C data types

13. <float.h>: definitions relating to floating-point arithmetic


Tuesday, 17 November 2015

4 Ways To Be Anonymous Online

4 Ways To Be Anonymous Online

Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!


1. Using Proxies

A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage ofa proxy is that your real IP address is Hidden so when you hack your giving the IP address ofthe proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you areIP is banned. To know more about proxies les me know above this post and I will post a full tutotial about it.


2. Using Tor


Tor-proxy is a free proxy-server service that Internet users can useto hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal auser's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it


3. SSH Tunneling

SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted trafficover a network through an encrypted channel.In easy language,you can surf net withoutbeing monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide.


4. Using VPN

Virtual Private Network. Basically it’s a private network which lets users to connect to other users orremote sites using a public network usually internet. It uses "virtual" connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure,such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid Andfree VPN services.
 

A History Of Hacking

A History Of Hacking


A history of hacking Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, hacker was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle Captain Crunch, is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL TAP (Youth International Party Line Technical Assistance Program) magazine to help phone hackers (called phreaks) make free long- distance calls. Two members of California's Homebrew Computer Club begin making blue boxes, devices used to hack into the phone system. The members, who adopt handles Berkeley Blue (Steve Jobs) and Oak Toebark (Steve Wozniak), later go on to found Apple Computer. Early 1980s Author William Gibson coins the term
cyberspace in a science fiction novel called Neuromancer. In one of the first arrests of hackers, the
FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan- Kettering Cancer Center to Los Alamos National Laboratory. Comprehensive Crime Control Act gives Secret Service jurisdiction over credit
card and computer fraud. Two hacker groups form, the Legion of Doom in the United States and the
Chaos Computer Club in Germany. 2600 The Hacker Quarterly is founded to share tips on phone and computer hacking. Late 1980s The Computer Fraud and Abuse Act gives more clout to federal authorities. Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks. At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and
Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison. First National Bank of Chicago is the victim of a $70-million computer heist. An Indiana hacker known as Fry Guy -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles Prophet, Leftist and Urvile. Early 1990s After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab
St. Louis' Knight Lightning and in New York grab Masters of Deception trio Phiber Optik,  Acid Phreak and Scorpion. Fellow hacker Eric Bloodaxe is picked up in Austin, Texas. Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit,
conducts raids in 12 major cities, including Miami. A 17-month search ends in the capture of hacker Kevin Lee Poulsen (Dark Dante), who is indicted for stealing military documents. Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs Data Stream, a 16-year-old British teenager who curls up in the fetal position when seized. A Texas A&M professor receives death threats after a hacker logs on to his
computer from off-campus and sends 20,000 racist e-mail messages using his Internet address. In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. Late 1990s Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone. A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message The media are liars. Family's own 15-year-old son eventually is identified as stalking culprit. Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses. Popular Internet search engine Yahoo!
is hit by hackers claiming a logic bomb will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. There is no virus, Yahoo! spokeswoman Diane Hunt said. 1998 Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway. In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called spamming. Hackers break into United Nation's
Children Fund Web site, threatening a holocaust if Kevin Mitnick is not freed. Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and
transportation systems from hackers. Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

Make A Disco Keybord

Make A Disco Keybord

Make a Disco Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows.

This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard. Keyboard tricks To make your own live disco, follow the steps given below:-

1. Open Notepad.
2. Copy paste the exact code given below:-
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3. Save the file as Disco.vbs or "*.vbs". Cool Keyboard Tricks Double click on the Saved file to see the LED lights on your keyboard go crazy and make your own cool disco. This trick has been tested on Windows XP, Windows Vista, Windows 7 and Windows 8 and found to be working
perfectly. You can disable the keyboard disco by starting Task Manager and ending the wscript.exe process.

What Is Dram (Dynamic Random Access Memory)

What Is Dram (Dynamic Random Access Memory)


Dynamic random access memory (DRAM) is the most common kind of random access memory (ram) for personal computers and workstations.
The network of electrically-charged points in which a computer stores quickly accessible data in the form of 0s and 1s is called memory
Random access means that the PC processor can access any part of the memory directly rather than having to proceed sequentially from some starting place
DRAM is dynamic in that, unlike static RAM (SRAM),
it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds
Static RAM does not need refreshing because it operates on the principle of moving current that is switched in one of two directions rather than a
storage cell that holds a charge in place.
Static RAM is generally used for cache memory, which can be accessed more quickly than DRAM.
DRAM stores each bit in a storage cell consisting of a capacitor and a transistor.
Capacitors tend to lose their charge rather quickly; thus, the need for recharging.
A variety of other RAM interfaces to the computer exist
These include: EDO RAM and SDRAM.

Microsoft Windows History

Microsoft Windows History


WINDOWS VERSION HISTORY:
WINDOWS 1.0 ------>16 Bit Os
(1985)
WINDOWS 2.0 ------>16 Bit Os
WINDOWS 3.0 ------>16 Bit Os
(1990)
WINDOWS 3.1 ------>16 Bit Os
(1992)
WINDOWS NT 3.1 ------>32 Bit Os
(1993)
WINDOWS 95 ------>Used WIN32
API
WINDOWS 98
WINDOWS ME
WINDOWS NT 4
WINDOWS 2000 (or also Known as
WINDOWS NT 5)
WINDOWS XP (or also Known as
WINDOWS NT 5.1)
WINDOWS XP PROFESSIONAL -----
>Supports 64 Bit
WINDOWS SERVER 2003
WINDOWS VISTA (WINDOWS NT
6.0)
WINDOWS 7 (WINDOWS NT 6.1)
------->WINDOWS 7 ULTIMATE
------->WINDOWS 7 HOME PREMIUM
------->WINDOWS 7 HOME BASIC
------->WINDOWS 7 PROFESSIONAL
------->WINDOWS 7 STARTER
------->WINDOWS 7 ENTERPRISE
WINDOWS SERVER 2012
WINDOWS 8 (WINDOWS NT 6.2)
------->WINDOWS 8
------->WINDOWS 8 Pro
------->WINDOWS 8 ENTERPRISE
------->WINDOWS 8 RT (FOR
TABLETS)
XP-EXTENDED PROCEDURE
NT-NEW TECHNOLOGY

5 Deadly Linux Commands That Can Destroy A System

5 Deadly Linux Commands That Can Destroy A System


1. Command  rm -rf  = It will Delete
Everything Explanation  It is a combination of three keywords. First is  rm It will remove all the files followed by this command. Second is  -rf This will run rm command in more effective way and will remove everything  ( all files and folders inside the specified folder ) without asking confirmation from the user. Third is This will start removing the data from the root directroy and will delete everything from the computer including the data of removable media.

2. Command  (){  & }; = Shell function that gets repliacated. This command creates a shell function ,
which once get initialized starts to create multiple copies of itself. It results in taking quickly all the memory and power of CPU.It makes computer freeze or not responding. This is also known as Denial Of Service Attack.

3. Command  mkfs.ext4 devsda1 = This command will format the hard disk Explanation  This command is again composed of two keywords. First is  mkfs.ext4  This part of command will create a new ext4 file system on following device where this command will get executed. Second is devsda1 ;This part of command specifies the 1st partition on the first hard disk which is probably in use by the user. Similarly, This Command  mkfs.ext3 devsdb2 will Format the second partition on the second hard disk with ext3 File system.

4. Command  devsda – Write Any content Directly to a Hard Drive. Explanation  This command will execute normally as other commands in linux do. But output of this command will directly be sent to the file system (NTFS or FAT ) of the Hard Drive. It will result into damaging the file system of the computer.

5. Command  mv ~ devnull – Beware it Will Move your Home Directory To Black hole. Explanation  Moving any of your content and data to following path devnull means you want to destroy it. It means devnull is a black hole where once anything sent , can not be recovered back. NoteMany of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work
otherwise. On other Linux distributions, most commands must be run as root.

10 Hacking Software & Tools Contains A Following Software

10 Hacking Software & Tools Contains A Following Software


- Cain and Abel (sniffer)
- John the Ripper (powerful brootforce)
- NetStumbler (allows to define radius of action of network WiFi in real time for the diagram it is possible to see size of a useful signal) 
- Nmap (one of the best network scanner)
- Putty (a quite good telnet the client)
- SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)
- Hping (allows to generate specialICMPUDPTCP packages and to look through answers ping a hostin style of the usual utility ping)
- Lcp (audit and restoration of passwords Windows NT  2000  XP  2003) 
- Nikto (perl the scanner broken Web a server, with support SSL)
- Kismet (sniffer a wireless network 802.11 and the decoder of packages) 38 minutes 

Ubuntu 10.10

Ubuntu 10.10


Ubuntu 10.10 Settings: Configure Ctrl-
Alt-Del As Task Manager How To Bind Ctrl-Alt-Del in Ubuntu
Linux, Windows style???

Always swear by the Ctrl-Alt-Del combo and wants Ubuntu to have the
same feature even though it hasn't crashed on you yet? Well, I understand.

Familiarity is a good thing. This is for those of you who seeks
familiarity in an unfamiliar surrounding.
Especially for recent converts from WIndows.
Right after installing or
reinstalling Ubuntu, one of the first
Ubuntu must haves or customization is the ability to simulate the behaviour of the control-alt-delete combination key
strokes to open the Task Manager, or the System Monitor, as it is called in Ubuntu.
This article will show you the easiest way to customize this feature to end tasks or kill unresponsive processes.
Unlike other methods which involved using terminals, if you did this just once and understood the steps, you will be able to reduplicate this for other new
installations of Ubuntu without referring to your notes whatsoever.

Some background:
In Ubuntu, when you press Ctrl-Alt-Del,you will get the Log Out screen, which
is not what Windows users expected. Here's how to enable the Ctrl-Alt-Del shortcut the "right" way: Go to "System > Preferences >
Keyboard Shortcuts" (In Ubuntu 10.04, older versions may have it elsewhere under a different name, look around) .

1. Change the key combo for the current Ctrl-Alt-Del binding:
Look for "Log out", where you can see: "Log out - Ctrl+Alt+Delete"
Click on the "Log out" line and you will be prompted to enter a new key, try "Ctrl-Shift-Del" or whatever key combination not in use.
2. Enter the new Ctrl-Alt-Del:
At the bottom of the "Keyboard Shortcuts" window, click on "Add", to
add a new "Custom Shortcut" combination. Name:* Ctrl-Alt-Del Command: gnome-system-monitor *You can name it whatever you want,
even "Windows Task Manager", as in Windows. Click "Apply", and then click on "Disabled", next to the new Ctrl-Alt-Del entry, and press Ctrl-Alt-Del to enter the
new key combination when you see "New shortcut", and you're done!
Test it out by pressing Ctrl-Alt-Del .

You Wanna Backup Your Computer

You Wanna Backup Your Computer

Backup the whole c drive
backup c:\document files
backup program files
deleting a log file on c drive backup the registry
Type those code on notepad and save
it .bat extinction like: "backup.bat" @echo off
::script developed by Learn Advance
Hacking
:: variables are created for the backup
drives and the command to execute
set drive1=D:\ set drive2=E:\
set backupcmd=xcopy /s /c /d /e /h /
i /r /y echo ### Backing up the whole C
drive to E...
%backupcmd% "C:\" "%drive1%" echo ### Backing up C:\MyDocs to
drive E...
%backupcmd% "C:\MyDocs"
"%drive2%\Apache2" echo ### Backing up Program Files to
drive E...
%backupcmd% "C:\Program Files"
"%drive2%\C Backup\Program Files" echo ### Deleting a log file on C for
cleanup...
del c:\path\to\file.log echo ### Backing up the Registry...
if not exist "%drive2%\Registry"
mkdir "%drive2%\Registry"
if exist "%drive2%\Registry
\regbackup.reg" del "%drive2%\Regis
try\regbackup.reg" regedit /e "%drive2%\Registry
\regbackup.reg" :: use below syntax to backup other
directories...
:: %backupcmd% "...source directory..."
"%drive%\...destination dir..." :: delete these following lines if you
don’t want the DOS window to stay
open after backup
echo Backup Complete!
0@pause.

How To Write A "C" Program Without A Main Function

How To Write A "C" Program Without A Main Function


Is it possible to do
that.Yes there can be a C program
without a main function.Here’s the
code of the program without a main
function… #include #define decode(s,t,u,m,p,e,d)
m##s##u##t
#define begin decode(a,n,i,m,a,t,e) int begin()
{
printf(” hello “);
} Does the above program run without
the main function? Yes, the above
program runs perfectly fine even
without a main function.But
how,whats the logic behind it? How
can we have a C program working without main ? Here we are using preprocessor
directive #define with arguments to
give an impression that the program
runs without main.But in reality it runs
with a hidden main function. The ‘##‘ operator is called the token
pasting or token merging
operator.That is we can merge two or
more characters with it. NOTE: A Preprocessor is program which
processess the source code before
compilation. Look at the 2nd line of program- #define decode(s,t,u,m,p,e,d)
m##s##u##t What is the preprocessor doing
here.The macro decode(s,t,u,m,p,e,d) is
being expanded as “msut” (The ##
operator merges m,s,u & t into
msut).The logic is when you pass
(s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters
(tokens). Now look at the third line of the
program- #define begin decode(a,n,i,m,a,t,e) Here the preprocessor replaces the
macro “begin” with the expansion
decode(a,n,i,m,a,t,e).According to the
macro definition in the previous line
the argument must de expanded so
that the 4th,1st,3rd & the 2nd characters must be merged.In the
argument (a,n,i,m,a,t,e) 4th,1st,3rd &
the 2nd characters are ‘m’,'a’,'i’ & ‘n’. So the third line “int begin” is replaced
by “int main” by the preprocessor
before the program is passed on for the
compiler.That’s it… The bottom line is there can never exist
a C program without a main
function.Here we are just playing a
gimmick that makes us beleive the
program runs without main function,
but actually there exista a hidden main function in the program.Here we are
using the proprocessor directive to
intelligently replace the word begin”
by “main” .In simple words int
begin=int main.