How to find keylogger or any spyware in PC
Find keylogger or spywares in your PC or system |
How to Find Keyloggers or Trojans in PC |
3. Now in above snapshot you can clearly identify the keylogger and system files. Check the Program name and then check its corresponding location in full path. Also you can verify with time at which keylogger file has been created.
How to stop virus or trojan attacks – Hacking class 18
If you want to know that your system is either infected by viruses and trojans then these are certain techniques to know that:
1. Your Computer might be running slow usual than normal.
2. Some programs might open without your permission.
3. System start up takes too much time to start.
4. Various Error messages appear on Screen when you open something or without opening also.
5. System registry has been disabled or folder options is missing.
6. The most important antivirus shows messages of detecting viruses time to time.
7. While scanning your system from any antivirus or anti spyware tool its showing viruses and you noticed that viruses are not deleting.
and much more…
Have you ever think about the reason why your system is got infected. What has infected your system and if its done by any of your friend How he has done it. Surely No, or in some cases you have tried to find the answer but you are not able to get proper answer. But story is different here , I will tell all the ways How your system can be Get infected and How you can protect it if its already infected How you can resolve the problem. So here are few things How your System got Infected , some might be knowing this but by some reason they have ignored them.
1. Using Cracked Versions of software specially security ones like antivirus, anti-spyware etc.
Why I have said this is the first and major cause of infection because of the following simple reason that All hackers know that general internet user public always searches for cracked versions of software’s and wishes to use them for free and Hacker take benefit of them. You all now be thinking how it help hackers. We know that almost all antivirus show each and every keygen as virus or some trojan depending upon its type. Now if we all know that then how come hackers will forget this fact so what they do they attaches trojans and viruses to these files and at the time When your antivirus shows it as virus you ignores the alert and keep the keygen means trojan running.
NOTE: And Guys an important note for you all, If your antivirus doesn’t show any keygen or crack as a virus then don’t ever think that its not a virus but its a most dangerous thing. Why dangerous because now Hacker has used some more brain to fool you that is he has made the virus undetectable simply edit the hex code of original virus. So what is the moral of story Please don’t use cracked versions.
Now you all be thinking that if we don’t use the cracked versions then how we will able to get full versions of the software’s. Don’t worry when I am there no fear drink beer and enjoy everything for free. Its solution will be in solutions step just read article.
2. Pen drive or USB drive :
The biggest cause of infection of your system is usb drives and external hard disks.
Now how a virus enters into your system using USB drives. You have connected your USB drive to your friends computer and by chance (sorry its for sure i.e 100%) your friends system is infected by virus or Trojans and its the property of Virus that it replicates itself using memory. So when you connect your USB to your friends computer your USB is now infected by virus and now when you connect this USB to your PC using the property of your Windows that it searches the files in Newly connected device and autorun the device and for doing this it loads the index of your USB’s file system into Memory and now if USB has virus its the property of virus its replicates itself using system memory. Now if you are using good antivirus , your antivirus will pop warning and alert messages and some times you ignores them means your system is also infected. For USB drive virus solution keep reading article.
3. Downloading things from Unknown Sites:
Most of the users searches for thing over the internet and where ever they find their desired result means file that they want they start downloading that from that site only. Now how it affects your system suppose you want to download any wallpaper say Katrina Kaif. Now hackers know the fact that Katrina has a huge fan following and user will surely going to download it. Then what they do they simply bind their malicious codes with some of files and when users download it his system is infected and he can never imagine that the virus has come from wallpaper that he has downloaded from unknown site. For its solution read on article.
4. The most important one Becoming a Hacker like Me (ROFL but its truth).
Why I have mentioned this you might be clear from the above discussion. Most of the internet users always curious to know ways how can i hack my friends email account or his system for these they download all type of shit from the internet and believe me 99.9% of this shit contains viruses and Trojans that sends your information to the providers. Now I don’t say that stop hacking but try to follow some basic steps to learn hacking and first of all you must know how to protect yourself from such type of fake software’s. For its solution read on article.
Now after discussing the things How you system is got infected by your simple negligence. Its time You should Know How to fix them and protect your system from all types of viruses and trojans.
1. Using Good Antivirus:
There is a nice misconception between the internet users that full antivirus provides better security. Ya its 100% truth but full antiviruses paid ones not the cracked ones.
There are several other solutions to them that you will get for absolutely Free and I guarantee that it will protect your system 100% just doing some little configurations.
Best Free Antivirus : Avira Personal Antivirus i.e Antivir.
You can download avira for free from :
http://www.filehippo.com/download_antivir/
Now after downloading the antivirus what you have to do to make it as good as paid antiviruses.
a. Install the antivirus and update it. Note updating antivirus regularly is compulsory. Don’t worry its not your work it will update itself automatically whenever update is available.
b. After Installing at the right hand top corner you will see a “CONFIGURATION” button. Just click on it now a new window will pop up.
c. Now There at left hand top you will see a click box in front of Expert is written . Click on that now you will see several things in it. Now do the following setting one by one.
1. Click on “Scanner” click on all files and set the “Scanner Priority” to high and click on apply.
2. Click on “Guard” and click on all files and click on “Scan while reading and writing” and then click apply.
3. Click on “General” Now click on select all and click on apply. In general tab only go to WMI section and click on advanced process protection and then click on apply.
4. After doing that restart your PC.
Now you have made your free antivirus an equivalent to the paid one..
Best Free Anti-Spyware: Spyware Terminator with crawler Web security toolbar.
Download It for free :
http://www.filehippo.com/download_spyware_terminator/
Install spyware terminator with web security tool bar . Now your following problems are being solved:
1. No Trojan can attack you.
2. Protection from Malicious websites and much more..
2. Solution for Cracked version Software’s:
As I have mentioned earlier never download cracks and keygens directly to you system but several other methods are there while you are searching for Crack or Keygen first try to search for Serial Key if you found it then its awesome and if not what to do.
Before downloading any Crack and Keygen . Go to the Website:
;
Now copy the download link of the Keygen or crack in the URL box provided on website this website contains all the world famous antiviruses and it will scan file for you if it contains any virus just ignore that otherwise have fun with crack or Keygen.
How you can protect your system from being infected from the pen drive. Just do the following three things rest is being cared by your antivirus.
1. Turn off Auto Play Devices:
To do it Go to Start Menu–> RUN–>type gpedit.msc and press enter–>User Configuration–>Administrative templates–>System–>Turn off Autoplay–> click on enable and then select all drives.
2. Turn of Computer Browser service:
To do it Go to Start Menu–> RUN–>type services.msc and press enter–>then Find Computer Browser service and disable it and restart your system.
3. Most important one Always scan the Pen drive or External hard drives after connecting them.
The solution of this problem is already provided Web browser Security toolbar will help you in surfing only secured and genuine websites and if you want to visit and download Virus Total will help you to identify the file whether its infected or not.
Why I have mentioned this is simply because Hackers always take benefit of these noobish tricks that they attach viruses with files and name them as hack tools . So avoid them if you are too curious like me. Then there are several ways to Handle it.
1. Use Deep Freeze on C drive: For testing Hack tools always use deep freeze as after the next restart your system will be at same position as it was previous.
2. Install Virtual Box and over virtual box install another Windows and test all hack tools using virtual windows. This will protect your system from being infected. Also It will give you more knowledge about handling the viruses and other situations like when something wrong is done what i have to do.
3. Create two to three fake email ID’s and use them for testing Keyloggers and other fake email hacking software’s.
For Some more security Tips you can also read my previous article:
I hope You all have liked this Article if you have any queries ask in form of comments and all suggestions are heartily Welcomed.
Hacking Class 17 – Different Types of Virus and Worms Explained
Hey Guys Welcome back In my previous tutorial I have just named the different types of viruses. Today we are going to have a deeper look of these different types like where they store, what they damage,and how to get rid from them?? So Guys read on…
System Sector Viruses
System sectors are special areas on your disk containing programs that are executed when you boot (start) your PC. System sectors (Master Boot Record and DOS Boot Record) are often targets for viruses. These boot viruses use all of the common viral techniques to infect and hide themselves. They rely on infected floppy disk left in the drive when the computer starts, they can also be “dropped” by some file infectors or Trojans.
Stealth Virus
These viruses evade anti-virus software by intercepting its requests to the operating system.
A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it appears as if the file is “clean”.
Bootable CD-ROM Virus
These are a new type of virus that destroys the hard disk data content when booted with the infected CD-ROM.
Example: Someone might give you a LINUX BOOTABLE CD-ROM.
When you boot the computer using the CD-ROM, all your data is gone. No Anti-virus can stop this because AV software or the OS is not even loaded when you boot from a CD-ROM.
Self-Modification Virus
Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for virus signatures.
A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses.
Self-modification viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. (each infected file
contains a different variant of the virus)
Polymorphic Code Virus
A well-written polymorphic virus therefore has no parts that stay the same on each infection.To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine). Polymorphic code is a code that mutates while keeping the original algorithm intact.
Metamorphic Virus
Metamorphic viruses rewrite themselves completely each time they are to infect new executables. Metamorphic code is a code that can reprogram itself by translating its own code into a temporary representation, and then back to normal code again.
For example, W32/Simile consisted of over 14000 lines of assembly code, 90% of it is part of the metamorphic engine.
File Extension Virus
File extension viruses change the extensions of files. .TXT is safe as it indicates a pure text file. With extensions turned off if someone sends you a file named BAD.TXT.VBS you will only see BAD.TXT.If you’ve forgotten that extensions are actually turned off, you might think this is a text file and open it. This is really an executable Visual Basic Script virus file and could do
serious damage .
Countermeasure is to turn off “Hide file extensions” in Windows.
These are for Today .. Tomorrow we will Discuss HOW TO MAKE VIRUSES and HOW TO DO VIRUS CODING without knowing much about coding and programming language…So guys keep Reading…
IF YOU HAVE ANY QUERIES ASK ???