New Post


Saturday, June 19, 2010
Hacking Class 17 - Different Types of Virus and Worms Explained

Hacking Class 17 - Different Types of Virus and Worms Explained

Hey Guys Welcome back In my previous tutorial I have just named the different types of viruses. Today we are going to have a deeper look of these different types like where they store, what they damage,and how to get rid from them?? So Guys read on...

Hacking Class 17 - Different Types of Virus and Worms

System Sector Viruses 

System sectors are special areas on your disk containing programs that are executed when you boot (start) your PC. System sectors (Master Boot Record and DOS Boot Record) are often targets for viruses. These boot viruses use all of the common viral techniques to infect and hide themselves. They rely on infected floppy disk left in the drive when the computer starts, they can also be "dropped" by some file infectors or Trojans.

Stealth Virus

These viruses evade anti-virus software by intercepting its requests to the operating system.
A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it appears as if the file is "clean".

Bootable CD-ROM Virus

These are a new type of virus that destroys the hard disk data content when booted with the infected CD-ROM.
Example: Someone might give you a LINUX BOOTABLE CD-ROM.
When you boot the computer using the CD-ROM, all your data is gone. No Anti-virus can stop this because AV software or the OS is not even loaded when you boot from a CD-ROM.

Self-Modification Virus

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for virus signatures.
A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses.
Self-modification viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. (each infected file
contains a different variant of the virus)

Polymorphic Code Virus

A well-written polymorphic virus therefore has no parts that stay the same on each infection.To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine). Polymorphic code is a code that mutates while keeping the original algorithm intact.

Metamorphic Virus

Metamorphic viruses rewrite themselves completely each time they are to infect new executables. Metamorphic code is a code that can reprogram itself by translating its own code into a temporary representation, and then back to normal code again.
For example, W32/Simile consisted of over 14000 lines of assembly code, 90% of it is part of the metamorphic engine.

File Extension Virus

File extension viruses change the extensions of files. .TXT is safe as it indicates a pure text file. With extensions turned off if someone sends you a file named BAD.TXT.VBS you will only see BAD.TXT.If you've forgotten that extensions are actually turned off, you might think this is a text file and open it. This is really an executable Visual Basic Script virus file and could do
serious damage .
Countermeasure is to turn off “Hide file extensions” in Windows.

Hacking Class 17 - Different Types of Virus and Worms

These are for Today .. Tomorrow we will Discuss HOW TO MAKE VIRUSES and HOW TO DO VIRUS CODING without knowing much about coding and programming language...So guys keep Reading...

Friday, June 18, 2010
Make Your Mobile Phone a PC Remote to Control PC

Make Your Mobile Phone a PC Remote to Control PC

Hey guys Today I will going to explain How to use your Mobile phone to control your PC from anywhere In the Home. Imagine walking home from work or college, and turning on your favorite music tracks straight from your phone as you walk in the room. So Guys here is the method...

1. PC with Bluetooth connectivity (If your PC don't have Bluetooth Buy a Bluetooth Dongle it cost only Rs 100)
2. Mobile Phone with Bluetooth Inbuilt.
3. Java Compatibility Mobile Phone.
4. Mobile Witch
(Before you  get started you will need to install both Mobile Application and PC Server.)
5. If Mobile witch is having Problem then use Phone Remote Control (

What is Mobile Witch??
MobileWitch is a very interesting free of charge computer software that allows you to turn your phone into a Pc Remote Control. It will allow you to access various PC application with your Phone. Now you can easily remote control your PowerPoint presentations, Mouse Cursor or simply explore the content of your computer directly from your mobile phone. To take advantage of this software you will need to have a PC and a phone that support bluetooth to send and receive data.

Key Features include: 

  • Remotely control Mouse, Keyboard, PowerPoint, Winamp, Windows Media Player and much more
  • Get access to your desktop from your phone
  • Bluetooth setup free! Simply connect from your phone
  • Customize your applications through Keymaps or VB and JScripts
  • Supports all PC Bluetooth solutions Toshiba, Windows, BlueSoleil and Widcomm/Brodacom

The software consist of two parts. There is a client and then there is a server which are both programmed in JAVA. The former is located into a J2ME capable mobile phone with Bluetooth capabilities while the latter is placed in the computer you wish to remotely control. So all you need to do is run the software on your mobile phone with Bluetooth™ support and a Bluetooth dongle installed on your computer.


Step 1:
Start the PC Server application first

Step 2:
Start the Mobile Application. On Nokia phones the shortcut is located in Menu/Applications/Collection. The phone will automatically start searching for active devices.
Once both devices are connected you will be abble to acces the Mobilewitch Bluetooth Remote Control Menu from your phone.
From this menu you will be able to control your mouse cursor, keyboard and the following programs, if installed on your computer: Windows Explorer, Firefox, Window Media Player , Internet Explorer, Winamp and Powepoint. Please note that each application you would like to control has to be first started from the computer and needs to be Always On Top of your desktop.
The application does not require any configuration of Bluetooth or Java on both the client or server and the applications it work with are Firefox, Winamp, Windows Media Player, PowerPoint, Internet Explorer and Explorer.
Friday, June 4, 2010
no image

Hackers Software AIO 2010 - Latest Hack tools Collection

Ghosty's Hackers Software AIO 2010

Hackers Software AIO 2010 | 30MB

By LOKESH owner of

Its hack tools Collection. As I am professional Hacker so I know How to handle Viruses. So I am warning all users that Please Install The Deep Freeze First Before Using this. Otherwise No Antivirus or trojan remover can Help you... As Its a Complete hacker's Package.

This Soft is 100% likely to include viruses and trojans which are so new they are not yet found by anti-virus scanners. if you want to play with very new warez and h4X0r content then you can expect this.

There are solutions to the problem. experts use a program called 'deep freeze' to lock their systems and stop the viruses from working. you can also use registry guards to stop the viruses working e.g. Sandboxie

Beware if your computer is infected with an unrecognized virus then you are also a source of infection for others and you are endangering all your private information and systems.



Download links:
no image

FarmVille Tools v2.4 - FarmVille Cheats and Hack Tools

FarmVille Tools v2.4

FarmVille Tools v2.4 | 6.7MB

FarmVille Tools is a FarmVille Cheats application to help you to harvest, plow and seed your crops in one click. With FarmVille Tools, you can harvest, plow and seed all crops in 3 seconds. FarmVille Tools even has a mouse recorder tool which can help you to record your mouse moves and clicks. It means that FarmVille Tools will automatically harvest your crops once they growed up, even though you leave away your PC!


-Harvest in 1 Click! – automatically harvest your crops in 1 Click!
-Plow in 1 Click! – automatically Plow your Land in 1 Click!
-Seed in 1 Click! – automatically seed your plants in 1 Click!
-Harvest when you away! – automatically harvest when you away!

Download links:
Password Spectator Pro 2.0.9 - See Hidden passwords

Password Spectator Pro 2.0.9 - See Hidden passwords

Password Spectator Pro 2.0.9

Password Spectator Pro 2.0.9 | 6.5MB

Password Spectator is a utility that allows you to easily find the passwords stored in any Windows application. You just have to run the program and click with the mouse over the password while pressing CTRL to remove the mask of asterisks, and to return with them to click a button while pressing the Caps key.

Download links:

Designed by Hackingloops.