Jul 17, 2010

Remove AUTORUN.INF from infected computers

Remove Autorun.inf Manually here i have given 3 methods .Choose anyone Method to remove the Virus...

1st Method :

Start-->Run--> Type Cmd -->Click Ok

so just type this stuff
at c:\ prompt

attrib a*.inf -h -a -s -r
del autorun.inf

Note : Then Change the Drive Letter C,D,E,F,G....and repaeat the Same Process..

Example :


2nd Method:

This Method is Simple and Easy,

Here is a simple code to remove autorun.inf: (start copying from the next line down):

cd\
c:
attrib -r -s -h autorun.inf
del autorun.inf
d:
attrib -r -s -h autorun.inf
del autorun.inf
e:
attrib -r -s -h autorun.inf
del autorun.inf
f:
attrib -r -s -h autorun.inf
del autorun.inf
g:
attrib -r -s -h autorun.inf
del autorun.inf
h:
attrib -r -s -h autorun.inf
del autorun.inf
i:
attrib -r -s -h autorun.inf
del autorun.inf
j:
attrib -r -s -h autorun.inf
del autorun.inf
k:
attrib -r -s -h autorun.inf
del autorun.inf
l:
attrib -r -s -h autorun.inf
del autorun.inf
m:
attrib -r -s -h autorun.inf
del autorun.inf
n:
attrib -r -s -h autorun.inf
del autorun.inf
o:
attrib -r -s -h autorun.inf
del autorun.inf
p:
attrib -r -s -h autorun.inf
del autorun.inf
q:
attrib -r -s -h autorun.inf
del autorun.inf
r:
attrib -r -s -h autorun.inf
del autorun.inf
s:
attrib -r -s -h autorun.inf
del autorun.inf

Copy this in a NOTEPAD file, then save the notepad file as : "file.bat" and then run it to remove all the rubbish of autorun.inf

3rd Method :

Autorun Eater:
Autorun Eater was born due to increase of malwares using the ‘autorun.inf’ tactic to infect users unknowingly be it from flash drives, removable hard disks or any other removable storage device.

Download: Autorun Eater

How To Open Multiple Gmail Accounts In IE8

If you are Gmail User and have lots of Gmail Account but can't access at the Same Time in IE 8. Don't Worry,here is the trick to Open Multiple Gmail Accounts in Internet Explorer 8. If you are a Firefox Fan see here How To Login With Multiple Orkut/Gmail/Yahoo Id In Firefox

1. Open Internet Explorer 8 and login to your Gmail account.
Note:
Make sure the Stay signed in option is unchecked when you sign in.
2. Goto File -->Click New Session


3. This will open a new Internet Explorer session.
4. Now open Gmail and sign in with different account.

Thats it !!! Enjoy all your Gmail Accounts.

25 Most Interesting Computer Facts



Here is a collection of 25 Most Interesting Computer Facts featuring Funny Computer Facts,I nternet facts,virus facts and more Computer Fun Facts.

1. 80% of all pictures on the internet are of naked women
2. Another name for a Microsoft Windows tutorial is 'Crash Course'!
3. Bill Gates house was designed using a Macintosh computer.
4. By the year 2012 there will be approximately 17 billion devices connected to the Internet.
5. Domain names are being registered at a rate of more than one million names every month.
6. E-mail has been around longer than the World Wide Web.
7. For every 'normal' webpage, there are five porn pages.
8. In the 1980s, an IBM computer wasn't considered 100% compatible unless it could run Microsoft Flight Simulator*.
9. MySpace reports over 110 million registered users. Were it a country, it would be the tenth largest, just behind Mexico.
10. One of every 8 married couples in the US last year met online.
11. The average 21 year old has spent 5,000 hours playing video games, has exchanged 250,000 e-mails, instant and text messages and has spent 10,000 hours on the mobile phone.
12. The average computer user blinks 7 times a minute, less than half the normal rate of 20.
13. The first banner advertising was used in 1994.
14. The first computer mouse was invented by Doug Engelbart in around 1964 and was made of wood.
15. The first domain name ever registered was Symbolics.com.
16. The world's first computer, called the Z1, was invented by Konrad Zuse in 1936. His next invention, the Z2 was finished in 1939 and was the first fully functioning electro-mechanical computer.
17. There are approximately 1,319,872,109 people on the Internet.
18. There are approximately 1.06 billion instant messaging accounts worldwide.
19. While it took the radio 38 years, and the television a short 13 years, it took the World Wide Web only 4 years to reach 50 million users.
20.70% of virus writers work under contract for organized crime syndicates.
21.A program named “Rother J” was the first computer virus to come into sight “in the wild” — that is, outside the single computer or lab where it was created.
22.The worst MS-DOS virus ever, Michelangelo (1991) attacked the boot sector of your hard drive and any floppy drive inserted into the computer, which caused the virus to spread rapidly.
23.A virus can not appear on your computer all by iself. You have to get it by sharing infected files or diskettes, or by downloading infected files from the Internet.
24. Country with the highest percentage of net users is Sweden (75%).
25. The first popular web browser was called Mosaic and was released in 1993.

Mar 23, 2010

A Virus Program to Disable USB Ports


In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.

Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.


2. It contains the following 4 files.

■block_usb.c (source code)
■unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.

3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).

Email Tracking



One of most the frequently asked question is how to track an email back to the sender.That is how to determine the sender of the email? The most obvious answer is by looking at the “From:” line! But this way of tracking does not work all the time since most of the spammers forge the email address or most of the spam that we get has a forged email address.This is also known as a spoofed email.Is it possible to send email from other’s address?Yes it is possible to send email from anyone’s name.Why not, you can send an email even from Bill Gate’s Email ID.If you need a proof look refer the post Send Spam Email To Friends


For more information on how to send a spoofed email refer the following post (link).

How To Send Fake Emails

OK now let’s come back to the topic of email tracking.So how do you determine where a message actually came from?Inorder to track an email we have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based protocol for transferring messages across the internet. A series of headers are placed in front of the data portion of the message. By examining the headers you can usually backtrack an email to the source network, sometimes the source host.

If you are using Outlook or Outlook Express you can view the headers by right clicking on the message and selecting properties or options.

Below are listed the headers of an actual spam message.I have double spaced the headers to make them more readable.

Return-Path:
X-Original-To: sriki@example.com
Delivered-To: sriki@example.com
Received: from 12-218-172-108.client.mchsi.com (12-218-172-108.client.mchsi.com [12.218.172.108])by mailhost.example.com (Postfix) with SMTP id 1F9B8511C7for ; Sun, 16 Nov 2003 09:50:37 -0800 (PST)
Received: from (HELO 0udjou) [193.12.169.0] by 12-218-172-108.client.mchsi.com with ESMTP id <536806-74276>; Sun, 16 Nov 2003 19:42:31 +0200
Message-ID:
From: “Maricela Paulson”
Reply-To: “Maricela Paulson”
To: sriki@example.com
Subject: You Have won $10000 in US Lottery Scheme
Date: Sun, 16 Nov 2003 19:42:31 +0200
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary=”MIMEStream=_0+211404_90873633350646_4032088448″
According to the From header this message is from Maricela Paulson at s359dyxxt@yahoo.com. I could just fire off a message to abuse@yahoo.com, but that would be waste of time.

This message didn’t come from yahoo’s email service.
The header most likely to be useful in tracking the actual source of an email message is the Received header. According to the top-most Received header this message was received from the host 12-218-172-108.client.mchsi.com with the ip address of 21.218.172.108 by my server mailhost.example.com. An important item to consider in tracking is at what point in the chain does the email system become untrusted? I consider anything beyond my own email server to be an unreliable source of information. Because this header was generated by my email server it is reasonable for me to accept it at face value.

The next Received header (which is chronologically the first) shows the remote email server accepting the message from the host 0udjou with the ip 193.12.169.0. Those of you who know anything about IP will realize that that is not a valid host IP address. In addition, any hostname that ends in client.mchsi.com is unlikely to be an authorized email server. This has every sign of being a cracked client system.
Here’s is where we start digging. By default Windows is somewhat lacking in network diagnostic tools; however, you can use the tools at to do your own checking.
sriki@nqh9k:[/home/sriki] $whois 12.218.172.108 AT&T WorldNet Services ATT (NET-12-0-0-0-1)12.0.0.0 – 12.255.255.255Mediacom Communications Corp MEDIACOMCC-12-218-168-0-FLANDREAU-MN (NET-12-218-168-0-1)12.218.168.0 – 12.218.175.255
# ARIN WHOIS database, last updated 2003-12-31 19:15# Enter ? for additional hints on searching ARIN’s WHOIS database.
I can also verify the hostname of the remote server by using nslookup, although in this particular instance, my email server has already provided both the IP address and the hostname.
sriki@nqh9k:[/home/sriki] $nslookup 12.218.172.108
Server: localhostAddress: 127.0.0.1
Name: 12-218-172-108.client.mchsi.comAddress: 12.218.172.108
Ok, whois shows that Mediacom Communications owns that netblock and nslookup confirms the address to hostname mapping of the remote server,12-218-172-108.client.mchsi.com. If I preface a www in front of the domain name portion and plug that into my web browser, http://www.mchsi.com/, I get Mediacom’s web site.
There are few things more embarrassing to me than firing off an angry message to someone who is supposedly responsible for a problem, and being wrong. By double checking who owns the remote host’s IP address using two different tools (whois and nslookup) I minimize the chance of making myself look like an idiot.
A quick glance at the web site and it appears they are an ISP. Now if I copy the entire message including the headers into a new email message and send it to abuse@mchsi.com with a short message explaining the situation, they may do something about it.

But what about Maricela Paulson? There really is no way to determine who sent a message, the best you can hope for is to find out what host sent it. Even in the case of a PGP signed messages there is no guarantee that one particular person actually pressed the send button. Obviously determining who the actual sender of an email message is much more involved than reading the From header. Hopefully this example may be of some use to other forum regulars.