This is Virus Community

Your Ultimate Tech Destination On My Web.

Saturday, 13 May 2017

Protect Against WannaCry: Microsoft Issues Patch For Unsupported Windows (Xp, Vista, Windows 8 & 8.1 Users)

Protect Against WannaCry: Microsoft Issues Patch For Unsupported Windows (Xp, Vista, Windows 8 & 8.1 Users Update —  If you are thinking that activating the kill-switch has completely stopped the WannaCry Ransom ware, then you are mistaken. WannaCry 2.0 version has just arrived without any 'kill-switch' function. Get prepared for the next massive wave of ransom ware attacks. In the wake of the largest ransom ware attack in...

Tuesday, 28 March 2017

Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN.

Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN A computer network is an interconnection of various devices like laptops, routers, switches, servers, etc. with the help of wired or wireless means. We can differentiate these networks by their reach, i.e., geographical area. For example, we have local area network, wide area network, personal area network, metropolitan area network, near-me network, etc. Whatever connection you use,...

Monday, 14 November 2016

USB Thief This Self Projecting USB Trojan Can Give You Nightmares

USB Thief This Self Projecting USB Trojan Can Give You Nightmares USB Thief This Self Projecting USB Trojan CanSecurity researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving its trace. The malware uses a unique method of protecting itself with AES128-encryption and renaming the files in each new instance. Imagine a malware that spreads through USB drives, steals...

Monday, 10 October 2016

Some Useful Websites For Hacking.

Some Useful Websites For Hacking. To check if a port is open:   http://www.canyouseeme.org/ To multiple scan a file for viruses:http://vscan.novirusthanks.org/ To check if a site is down:http://www.downforeveryoneorjustme.com/ A place to get newest exploits:http://www.exploit-db.com/ Lets other people view your inserted text:http://pastebin.com/ The free online crypting + decrypting service:http://www.crypo.com/ An online MD5 decrypter:http://www.md5decrypter.com/ The...

Friday, 1 July 2016

Five Common Mistakes That Fresh Hackers Make

Five Common Mistakes That Fresh Hackers Make Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker. 1. If you see a website offering hacking software or offering to hack email...

Sunday, 15 May 2016

Hacking Facebook & WhatsApp Signals To Track 4G/LTE Smartphone’s Precise Locations

Hacking Facebook & WhatsApp Signals To Track 4G/LTE Smartphone’s Precise Locations Researchers have made a low-cost gadget to track the precise location of smartphones using 4G/LTE by hacking Facebook and WhatsApp signals. It was earlier thought that though such attacks could be targeted against the 2G and 3G enabled smartphones and 4G/LTE enabled smartphones are immune. to such attacks Security researchers have revealed how simply...

Friday, 5 February 2016

Some Library Of C, C++ Programming & It's Description

Some Library Of C, C++ Programming & It's Description 1. <stdio.h>: input and output function in program. 2. <conio.h>: to clear screen and pause information function. 3. <ctype.h>: function for testing characters 4. <string.h>: function for manipulating string 5. <math.h>: mathematical function  6. <stdlib.h>: utility function for number, conversion, storage allocation 7. <assert.h>:...

Tuesday, 17 November 2015

4 Ways To Be Anonymous Online

4 Ways To Be Anonymous Online Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online! 1. Using Proxies A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage ofa proxy is that your real IP address is...

A History Of Hacking

A History Of Hacking A history of hacking Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, hacker was a positive term for...

Make A Disco Keybord

Make A Disco Keybord Make a Disco Keyboards usually have small LEDs which indicate whether different types of locks are activated or not. Here is a trick to use the lights of your keyboard in a more creative manner in Windows. This trick uses a simple Visual Basic Script which when activated makes your Scroll lock, Caps lock and Num lock LEDs flash in a cool rhythmic way which gives the perception of a live disco on your keyboard. Keyboard tricks...

What Is Dram (Dynamic Random Access Memory)

What Is Dram (Dynamic Random Access Memory) Dynamic random access memory (DRAM) is the most common kind of random access memory (ram) for personal computers and workstations. The network of electrically-charged points in which a computer stores quickly accessible data in the form of 0s and 1s is called memory Random access means that the PC processor can access any part of the memory directly rather than having to proceed sequentially from...