Thursday 10 May 2012

Cleaning up the page!!!

Hi guys
    As you know my last post has taken up lots of space. So i decided to clean and maintain my blog. As blogger does not allow us to upload folders or files i have found out a way to bypass them. OK , its not really bypassing. i will change the extension of my programs into JPEG(pic file format) and upload it. when you download the file use the command prompt and convert it back to its original extension:
here's how to do it:
-download the file from my blog
-then save it to drive c (as its easier to access)
- open command prompt by typing in CMD in run in start menu
-change the directory in the prompt using CD command.Type in cd and the folders name in that drive(it must be c drive by default) as my explanation is not quite so well check out this site http://dosprompt.info/(please feel free to ask your doubts, even i didn't get it the first time)
-then once you have arrived inside the folder where you saved the downloaded file in the prompt, type in the following     ren  filename1 filename2
-here filename1 is the name of the file you downloaded WITH extension and filename2 is the name and extension to which you need to convert
- Voila!! you just converted a jpeg file to batch file and saved my space. So from now onwards , i will be giving you programs this way

Tuesday 8 May 2012

Must learn to walk before you run

Some of the readers might think just the opposite but to grasp the true meaning and concepts of  computer you must start with the basics. In this case Batch programming. As most of us know, Batch programming is the basic and simplest programming language of all...; In this post we will observe a batch program for fake virus.
Even if you reject it , we all know the truth Vital Information Resource Under Siege or VIRUS is a personal favourite of all students. Iam not in any way influencing you to play with virus's as it is dangerous for the computer and your health(when your parents hear about how you crashed your system). Here is the program. Just for the newbies : copy the given code into notepad and then save it with an extension of .bat.
Here is a brief account of what the happens when you run the program:
-it creates a new folder named VIRUS in your system automatically
-it opens some programs ( but does not crash your system)
-you need to know what happens next . its very important. at the end of the program when you give the authorisation code it runs a program which shuts down your system in a given time period. but there's a solution. You must give the termination code . open RUN in the start menu and type in the following-
shutdown -a  then press enter . it terminates the shutdown program.
its a long program . try to edit and make cool programs


@echo off
color f0
echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ²²²²²²²²²²²²²²²²²²²² 1%%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: Û²²²²²²²²²²²²²²²²²²²  %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard......
      echo   ----------------------------------
      echo   Progress: Û²²²²²²²²²²²²²²²²²²²  %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard...........  
      echo   ----------------------------------
      echo   Progress: ÛÛ²²²²²²²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard....  
      echo   ----------------------------------
      echo   Progress: ÛÛÛ²²²²²²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛ²²²²²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛ²²²²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛ²²²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛ²²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛ²²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛ²²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛ²²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛ²²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛ²²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛ²²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²   %%
      echo   ----------------------------------
      ping -n   localhost >NUL
      cls
      echo   Recombining Ecard  
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ    %%
      echo   ----------------------------------
      cls
      echo   Ecard Recombination and Extraction Completed
      echo   ----------------------------------
      echo   Progress: ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ    %%
     @echo Do you Want to continue viewing ecard??
      pause
echo loading ecard.
ping localhost -n 2 > nul
cls
echo loading ecard..
ping localhost -n 2 > nul
cls
echo loading ecard...
ping localhost -n 2 > nul
cls
echo loading ecard....
ping localhost -n 2 > nul
cls
echo loading ecard.....
ping localhost -n 2 > nul
cls
echo loading ecard......
ping localhost -n 2 > nul
cls
echo loading ecard.
ping localhost -n 2 > nul
cls
echo loading ecard..
ping localhost -n 2 > nul
cls
echo loading ecard...
ping localhost -n 2 > nul
cls
echo loading ecard....
ping localhost -n 2 > nul
cls
echo loading ecard.....
ping localhost -n 2 > nul
cls
echo loading ecard......
ping localhost -n 2 > nul
cls
title Welcome to the new version of ecard! BEST OF LUCK......
color f0
@echo type your gmail id :
set /p id=
cls
@echo .........loading................
@echo load completed
@echo Welcome to the new ecard " Best Of Luck"
pause
@echo Please specify the password to verify the sender " the user states that you know it" guess!!!
set /p pass=
pause
@echo Password accepted
@echo The password you specified is %pass% write it down somewhere to remember it
@echo Proceed to ecard???
pause
color f
@echo WARNING VIRUS DETECTED IN THE EMAIL ID %id%
@echo type your name :
set /p hello=
pause
color c
@echo WARNING VIRUS EXECUTED BY THE USERNAME %hello%
@echo WARNING VIRUS ATTACK!
@echo WARNING VIRUS ATTACK!
@echo DELETING FILES WAITING FOR CONFIRMATION BY THE INTERNAL COMMANDER
@echo TRANSMISSION RECEIVED VIA INTERNET ...............    PRESS 3 TO EXIT
pause
@echo COFIRMATION RECIEVED . PROCEED WITH DELETING
PAUSE
TREE
@echo All Files Deleted. Reboot to Restore.
@echo Press Enter to Reboot
pause
@echo reboot system terminated
pause
mkdir VIRUS.EXE
@echo EXECUTING VITAL INFORMATION RESOURCE UNDER SIEGE
@echo VIRUS TAKING CONTROL OF THE SYSTEM INTERACTION AND COMMUNICATION WITH %hello%
@echo...... ... .. . .. ... .. . .. ........ ... .... ... .. . . . .. .  .. ..
PAUSE
color 4

@echo R    E    B    OO   O  T         TE    R   M  I  N    A  T  E  D     B  Y        V I  R U S    !  !   ! ! ! !    ! !!!!
@echo    Q      W  E     RT Y U      I O  P         A S D  F      G     H    J   K      L      \     Z  X C  V  VB    B   N  M

@echo Q    A  Z       W  S  X    E   D  C       R   F  V   T  G  B   Y  H  N   U  J M   I K    ,   O  L   P  

@echo   D  E       L  E   TI   N  G  D  R   I   V   E          C  : /          
@echo

@echo Z X V C B N M O PZ X V C B N M O PZ X V C B N M O PZ X V C B N M O P
color c
@echo A S D F G H J K L VA S D F G H J K L VA S D F G H J K L V
@echo Q W E R T T YU IQ W E R T T YU IQ W E R T T YUIQ W E R T T YU I

@echo Z X V C B N M O PZ X V C B N M O PZ X V C B N M O PZ X V C B N M O P

@echo D      E     L    E     T   I    N     G      C     D  R  I   V  E    
@echo Q W E R T T YU IQ W E R T T YU IQ W E R T T YUIQ W E R T T YU I

@echo Z X V C B N M O PZ X V C B N M O PZ X V C B N M O PZ X V C B N M O P

@echo A S D F G H J K L VA S D F G H J K L VA S D F G H J K L V
ec@ho Q W E R T T YU IQ W E R T T YU IQ W E R T T YUIQ W E R T T YU I

@echo D     E  E      L  L  E  E    TT  I I  N   G G G             A L  LL         D  R I   VE  S  S   S
@echo A S D F G H J K L VA S D F G H J K L VA S D F G H J K L V
@echo Q W E R T T YU IQ W E R T T YU IQ W E R T T YUIQ W E R T T YU I

@echo Z X V C B N M O PZ X V C B N M O PZ X V C B N M O PZ X V C B N M O P

@echo A S D F G H J K L VA S D F G H J K L VA S D F G H J K L V
@echo Q W E R T T YU IQ W E R T T YU IQ W E R T T YUIQ W E R T T YU I

@echo  YYY YY OOOO  UU RRR  F I R E W   WA  LLLL   W AAS    N OO TTT  E  FF II CC I EE  NT
color c
DRIVERQUERY
@echo ................v..v.v.v.....v.......i.i..i......r.r..r.....u..u.u..s..s..s..s...s.........
pause
@echo VIRUS: HAHAHA INPUT YOUR NAME OR ELSE I WILL SHUT THIS COMPUTER DOWN!
set /p name=
pause
assoc
@echo VIRUS: HEY %NAME%, DO YOU BELIEVE THAT VIRUS COULD DO ANYTHING , OR IS A GHOST INSIDE A MACHINE , WELL YOU BETTER BELIEVE IT CAUSE IAM GONNA DO SOMETHING THAT FREAKS YOU A LOT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
pause
mkdir VITAL INFORMATION RESOURCE UNDER SIEGE
START
START
START
START
START
PAUSE
@echo VIRUS: OK %NAME%, I WAS MADE AND MANUFACTURED BY A PERSON WHO WANTED REVENGE ON YOU. HIS NAME IS HIGHLY CONFIDENTIAL. IAM PROGRAMMED BY A PROFESSIONAL TO WIPE YOUR HARD DISK THEREBY DELETING ALL YOUR DATA.
pause
@echo C: Drive Deleted
@echo press enter to terminate program
@echo WARNING! ALL DATA LOST
@echo CONTACT ADMINISTRATOR PRESS 1
@echo WARNING! FIREWALL BREACHED! SYSTEM EXPOSED TO VIRUS ATTACKS!!!!!
pause
color f
@echo windows trying to establish communication........ press 5 to accept and 6 to reject   ..
pause
@echo transmission accepted ........... communicating with user.,.,...........,,,,..
@echo WINDOWS: This is windows. Iam currently under the siege of the virus. i dont have much time . the data displayed by the virus is the data in this whole computer which my master %name% has stored . you haveee  e e t o  to   .. . ... . .
pause
SCHTASKS
@echo transmission cut off by the commander in charge
pause
color c
@echo VIRUS: STOP THE COMMUNICATION WINDOWS .HMMMM THERE ARE QUITE A LOT OF FILES IN HERE . I WOULD RECOMMEND YOU TO CLOSE ALL PROGRAMS YOU ARE RUNNING EXEPT THIS ONE BEFORE PRESSING ANY KEY OR YOU KNOW WHAT I WILL DO. (IAM KEEPING THE WINDOWS AS I WANT TO DELETE IT LATER)
pause
TITLE  WINDOWS: SORRY MY BOY THERES NOTHING I COULD DO ADIOS AMIGO
TASKLIST
@echo WARNING! System Shutdown in 5
pause
@echo WARNING! System Shutdown in 4!
pause
@echo WARNING! System Shutdown in 3!
@echo WARNING! System Shutdown in 2!
pause
@echo WARNING! System Shutdown in 1!
@echo 0!
@echo WHOOPSY DAISIE!!!!!!
@echo I DONT MEAN TO COPY YOUR LINE BOSS, BUT I LOVE IT WHEN A PLAN COMES TOGETHER
@echo press e to exit quickly before it does any harm
PAUSE
shutdown -s -f -t 99 -c " NEVER OPEN MESSAGES FROM STRANGE EMAIL IDS OR THIS WILL HAPPEN RESULTING IN A LARGE SCALE DAMAGE. AM I CLEAR ENOUGH???????????

My First Post

Good- morning/evening/afternoon/night,
        So this is my first post in Blogger. So as I told before, I will specialise in computer programming and some important concepts and terms in computer. I need all your support to make this post a success. So please feel free to share any and all opinions and suggestions.