If you wanna do various tricks with computer(some call them hack), then knowledge of Batch files is important. Here, I have included "echo,pause,msg and cls"...

 
Picture
virus: a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.


 



Virus Categories:


  • File infector viruses: Infect program files
  • Boot sector viruses: Infect the system area of a disk
  • Master boot record viruses: memory resident viruses that infect disks in the same manner as boot sector viruses
  • Multi-partite viruses: infect both boot records and program files
  • Macro viruses: infect data files, such as Microsoft Office Suite files with macro script capabilities.
The new viruses are harder to eliminate. The cost of cleaning up after a virus infection has risen. According to a latest virus prevalence survey, the average cost to companies was $81,000 with $69,000 in the last survey.

Top 10 viruses in the past 5 years:

Top viruses of 2009:
  1. Netsky.q
  2. Nyzem.e
  3. bagle.gt
  4. Netsky.aa
  5. Scano.gen
  6. Diehard.dg
  7. small.bdj
  8. Mytob.q 
  9. Mydoom.1
  10. Warezov.yi 
Top viruses of 2008:
  1. Windx-Maxtrox
  2. Autoit variants
  3. Malingsi
  4. Recycler variants
  5. Fdshield
  6. Purwo variant
  7. Formalin
  8. Raider.vbs variant
  9. Autorunme variant
  10. Rieysha variant
Top viruses of 2007:
  1. Detnat
  2. Netsky
  3. Mytob
  4. Bagle
  5. MyWife
  6. Virut
  7. Zafi
  8. MyDoom
  9. Lovegate
  10. Bagz


Top viruses of 2006:
  1. Eliles.A worm
  2. Nuwar.A wins
  3. Spanta worms
  4. BarcPhish.HTML
  5. WebMic.A
  6. Nedro.B
  7. FormShared.A
  8. DarkFloppy.A
  9. Gatt.A.
  10. Todd Shriber
Top viruses of 2005:
  1. Zafi-D           
  2. Netsky-P         
  3. Zafi-B           
  4. Netsky-D          
  5. Netsky-Z         
  6. Netsky-B         
  7. N4ytob-Z         
  8. MyDoom-O         
  9. Netsky-C         
  10. Netsky-Q 
Top viruses of 2004:
  1. netsky
  2. objectdata
  3. sober
  4. mime
  5. bagle
  6. lovgate
  7. klez
  8. dumaru
  9. mydoom
  10. mhtredir
Now, how can the viruses be eliminated?  By the antivirus software’s.

 
The objective of microwave communication systems is to transmit information from one place to another without interruption, and clear reproduction at the receiver. Fig. indicates how this is achieved in its simplest form.

Above 100 MHz the waves travel in straight lines and can therefore be narrowly focused. Concentrating all the energy into a small beam using a parabolic antenna (like the satellite TV dish) gives a much higher signal to noise ratio, but the transmitting and receiving antennas must be accurately aligned with each other. Before the advent of fiber optics, these microwaves formed the heart of the long distance telephone transmission system.

In its simplest form the microwave link can be one hop, consisting of one pair of antennas spaced as little as one or two kilometers apart, or can be a backbone, including multiple hops, spanning several thousand kilometers. A single hop is typically 30 to 60 km in relatively flat regions for frequencies in the 2 to 8 GHz bands. When antennas are placed between mountain peaks, a very long hop length can be achieved. Hop distances in excess of 200 km are in existence.
Picture
The "line-of-sight" nature of microwaves has some very attractive advantages over cable systems. Line of sight is a term which is only partially correct when describing microwave paths. Atmospheric conditions and certain effects modify the propagation of microwaves so that even if the designer can see from point A to point B (true line of sight), it may not be possible to place antennas at those two points and achieve a satisfactory communication performance.

In order to overcome the problems of line-of-sight and power amplification of weak signals, microwave systems use repeaters at intervals of about 25 to 30 km in between the transmitting receiving stations. The first repeater is placed in line-of-sight of the transmitting station and the last repeater is placed in line-of-sight of the receiving station. Two consecutive repeaters are also placed in line-of-sight of each other. The data signals are received, amplified, and re-transmitted by each of these stations.

Microwave Transmitter and Receiver Fig. below shows block diagram of microwave link transmitter and receiver section

The voice, video, or data channels are combined by a technique known as multiplexing to produce a BB signal. This signal is frequency modulated to an IF and then up converted (heterodyned) to the RF for transmission through the atmosphere. The reverse process occurs at the receiver. The microwave transmission frequencies are within the approximate range 2 to 24 GHz.
Picture
The frequency bands used for digital microwave radio are recommended by the CCIR. Each recommendation clearly defines the frequency range, the number of channels that can be used within that range, the channel spacing the bit rate and the polarization possibilities.
 
THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112 The above is an example for operation using command prompt. “net view” is one of the netbios command to view the shared resources of the remote computer. Here “219.64.55.112″ is an ip address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid ip address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If not an error message is displayed. So repeat the procedure 2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt. The “net use” is another netbios command which makes it possible to hack remote drives or printers.

Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint   NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk. NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer. These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.

4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.

Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name. You can open it and access remote computer’s Hard-Drive. You can copy files, music, folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through “Command Prompt”.

NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3 With Different IP Address.