How does antivirus works

0 comments

We all know that what is an antivirus , what does Antivirus do. But have you ever wondered that how does antivirus work? How antivirus detect viruses and deletes them?
We know that Antivirus is a Software that detects harmful Softwares and programs like Virus, Worms, Trojan Horses, Spyware, Ad-ware etc and delete them or quarantine. Antivirus are one of the most important part of a computer which protects us from many attacks and dangers every day. But the Question arises that how do they work?
so here we go..

The Antivirus Work in two main Ways:

1)
 Signature based detection
(i.e. Examining files to look for known viruses by means of a virus dictionary)

2)
 Checking for Suspicious Behaviour
(i.e. Identifying suspicious behavior from any computer program which might indicate infection )



Signature Based Detection
The Signature Based Detection is the way in which the antivirus compare the content of the file to the dictionary of known viruses. This is a very effective way because it is able to identify all the viruses that are publicly known.
If a piece of code in the file matches any virus identified in the dictionary, then the antivirus software can then either delete the file, quarantine it so that the file is inaccessible to other programs and its virus is unable to spread, or attempt to repair the file by removing the virus itself from the file.
 
The example of it is like this: If their is a file named
 format-virus which formats hardisk and its coding is like "format-hardisk" then the antivirus will compare it with dictionary, now if in the database of dictionary it is written that their is a virus with code "format-hardisk" then the file format-virus will be considered as virus.

The effectiveness of this method depends on that the virus or Trojan is public if it is not that it may not be able to detect it. Some hacker uses
 Crypter software to hide the content of the file e.g "format-hardisk" would become "antivirus-lover" which actually is a virus. Now antivirus would not find it in Dictionary because it seems another file to dictionary but in reality the file would still be virus. To encounter with this problem Antivirus Dictionaries also include the entries to identify the Crypted Virus. For Example they would also keep "antivirus-lover" in Virus Signature and identify that as virus also.


Suspicious Behaviour
This type include the antivirus running in the real time and observing the behaviour of the the files running.The suspicious behavior approach, by contrast,it doesn't attempt to identify for known viruses, but instead it monitors the behavior of all programs, It looks if the files are overwriting the data without user's permission or notification or may be sending some data to some remote location via internet or something like this. If this kind of behaviour is observed by the antivirus then in that case Antivirus will suddenly stop the program and ask the user about the reliability of the file , that whether the file is trustworthy or not whether it should send data to that remote place or not.

The suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any antivirus dictionaries.



Note:- If you dont have antivirus in your computer then go and download it as soon as possible and scan your computer with antivirus because your computer is at high risk.

What is Windows Registry ?

0 comments

Windows Registry is a database used to store information that is necessary to configure the system for one or more users,, applications and hardware devices and it keeps record of the settings of all the Software installed in Computer including Operating System. applications and hardware devices and it keeps record of the settings of all the Software installed in Computer including Operating System. Windows Registry contains five Hives and hives contain Keys and Sub keys and their respective Values.
For Registry Editing:
Start > Run > Regedit
HKEY_CURRENT_USER: Contains the configuration information for the user who is currently logged on. The user's folders, screen colors, and Control Panel settings are stored here.
HKEY_USERS: Contains all the actively loaded user profiles on the computer. HKEY_CURRENT_USER is a subkey of HKEY_USERS.
HKEY_LOCAL_MACHINE: Contains configuration information particular to the computer (for any user).
HKEY_CURRENT_CONFIG: Contains information about the hardware profile that is used by the local computer at system startup.
HKEY_CLASSES_ROOT: The information that is stored here makes sure that the correct program opens when you open a file by using Windows Explorer.
Types of Keys:
Binary Value (REG_BINARY): Raw binary data. Most hardware component information is stored as binary data and is displayed in Registry Editor in hexadecimal format
DWORD Value (REG_DWORD): Data represented by a number that is 4 bytes long (a 32-bit integer). Can also contain binary, hexadecimal, or decimal format
Expandable String Value (REG_EXPAND_SZ): A variable-length data string. This data type includes variables that are resolved when a program or service uses the data
String Value (REG_SZ): A fixed-length text string
Multi-String Value (REG_MULTI_SZ): Values that contain lists or multiple values in a form that people can read are generally this type.


How to change Drive icons and labels

0 comments

How to change Drive icons and labels (Windows XP,2000)


To change Drive icon:
1- Click Start > Click Run > type “regedit” to run Registry Editor
2- Find following:
HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion / Explorer
3-create a new Key and name DriveIcons
4- Under DriveIcons create a new Key with the drive letter ( for example C ), within drive letter create a new key and name DefaultIcon”.
5- Give the default value , the icon you want to use, for example : c:\windows\system32/shell32.dll,74

To change Drive Label:
Do step one and two

Under DriveIcons create a new Key with the drive letter ( for example C ), within drive letter create a new key and nameDefaultLabel”.
Give the Default Value, the label you want. For example Windows.

Close Registry Editor and reboot your Computer
Note: editing the registry may damage your system. Please create a restore point before any changes

What is hacking? Types of hacking

0 comments
Hacking is the art of problem solving. People who engage in computer hacking activities are often called hackers. Basically Hackers are the people who do things in a smarter way which a normal person cannot. Whether its finding a solution or exploiting loopholes in programming.


Most of the people misconceive that hacking means "law breaking" which is NOT TRUE. All hackers are not criminals and neither hacking is illegal. Hacking is a sort of a power. A power of innovation , its up to a person whether to use these to be a superhero or be a wicked evil. So there is nothing wrong in learning hacking but its important to use your skills for good purpose and not to take undue advantage of your hacking skills. 


And how to distinguish between these superheroes(good hackers) and these villians ( bad hackers )-which are actually called crackers. Cracker was the term coined to distinguish evil hackers who steal our credit card numbers , defacing websites etc. Hackers stayed true to the Hacker Ethic, while crackers are only interested in breaking the law and making quick money. All the bad guys of the hacking world doing piracy, defacing websites, stealing credit card information etc. are supposed to be called 'crackers' who actually are less talented than the elite hackers

If i talk in terms of US laws then it says, it is intentionally accessing a system without permissions or may be exceeding authorized access, and thereby obtaining information. The laws basically emphasize more on government computers, but intrusion made on any individual's pc without his/her knowledge will also be called as a crime.



But this term is not being used by the media and because of its ability to sensationalise has made an evil image of the word hacker, although its not. In many cases, computer hacking helps prevent identity theft and other serious computer-related crimes.



Types of hacking

Friends i searched on many site under the topic types of hacking and i have found that most of the sites have only tell some different ways of hacking and not the proper categories of types of hacking.

So i am just giving division of types of hacking done by different hackers or whatever you call :-

1. Local Hacking
2. Social Networking Hacking
3. Remote Hacking.


Press backspace continuously notepad trick

0 comments
Step 1: Open Notepad.
Step 2: Paste the following code in the notepad.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop
 

Step 3: Now go to file and click on save as
Step 4: Give anyname with extention as .vbs for eg:- notepadtrick.vbs
Step 5: Now go and click on it or you can send this notepad to your friends also.......bingoo...:)





:: - Comment / Remark (plz)

Hit Enter Key Continuously

0 comments

Step 1: Open Notepad.

Step 2: Paste the following code in the notepad.

Set wshShell = wscript.CreateObject("WScript.Shell")


do



wscript.sleep 100

wshshell.sendkeys "~(enter)"


loop
 


Step 3: Now go to file and click on save as
Step 4: Give anyname with extention as .vbs for eg:- notepadtrick.vbs (Don't run it on your pc)
Step 5: Now go and click on it or you can send this notepad to your friends also.......bingoo...:)





:: - Comment / Remark (plz)

Matrix falling notepad trick

0 comments
After the success of the movie matrix people just started loving matrix pattern , its style. So here is a notepad trick which will show that matrix affect in your command prompt

Step 1: Open Notepad.
Step 2: Paste the following code in the notepad.

@echo off
color 02
:tricks
echo %random%%random%%random%notepad%random%

%random%tricks%random%%random%%random%%random%
%random%
goto tricks


Step 3: Now go to file and click on save as
Step 4: Give anyname with extention as .bat for eg:- notepadtrick.bat
Step 5: Now go and click on it or you can send this notepad to your friends also.......bingoo...:)





:: - Comment / Remark (plz)

This trick will pop out error messages again and again

0 comments
Step 1: Open Notepad.
Step 2: Paste the following code in the notepad.

@ECHO off
:Begin
msg * Welcome to hackfact
msg * You are learning cool notepad tricks
msg * Notepad tricks rocks
msg * Using notepad tricks we can even control whole computer
msg * What are your views in all these tricks using notepad
GOTO BEGIN


Step 3: Now go to file and click on save as
Step 4: Give anyname with extention as .bat for eg:- notepadtrick.bat
Step 5: Now go and click on it or you can send this notepad to your friends also.......bingoo...:)







:: - Comment / Remark (plz)

This trick will Open Notepad continuously automatically

0 comments
Step 1: Open Notepad.
Step 2: Paste the following code in the notepad.

@ECHO off
:trick
START %SystemRoot%\system32\notepad.exe
GOTO top


Step 3: Now go to file and click on save as
Step 4: Give anyname with extention as .bat for eg:- notepadtrick.bat
Step 5: Now go and click on it or you can send this notepad to your friends also.........
.bingoo...:)






:: - Comment / Remark (plz)

Worlds cheapest tablet "AAKASH" has been launched

0 comments

I am very proud to share this link with you all here. As we know the world's cheapest tablet supported by Google's Androind is being luanched now at Delhi. Yes! you can see it live. NDTV had full cover on this event. Check out this to know more about AAKASH the world's cheapest tablet. There were rumors a lot and it was announced that it will be a $35 tablet, but the reality is little different. Over all i think this is the best for students. Ans it was a great job by Indian govt for students.

The price of this cheapest tablet is just very low all student can easily afford it. Check out the sort description of this device reported by

NDTV.com: Name: Akaash (Not Sakshat as was originally called)


Manufacturer: Datawind
Price : Rs 2,276 (about $50)
Dimensions: 190.5x118.5x15.7mm
Screen: 7" resistive
Weighs: 350gms
Operating System: Android 2.2 (Doesn’t have Android Marketplace has Getjar instead)
Processor: 366MHz
Wi-fi enabled only
Connectivity: 2 full USB ports
Memory: 256MB RAM
Storage: 2GB Flash memory + 2GB Micro SD card(expandable to 32GB)
Battery: 2100mAh (Lasts 1.5 to 2 hours when watching HD videos & 3 hours on average use).During the launch of this cheapest tablet we came to know many more things about it and on this occasion some tablet were presented to some students. Here is the list of  Students receiving the tablet: 

2 students from Chandigarh

3 from Delhi2 from Gujarat
2 from Himachal pradesh
2 from Madhya Pradesh
2 from Maharashtra
2 from Orisa
2 from Punjab, 
2 from Rajasthan
2 from Tripura
6 from UP4 from IIT Rajasthan

They also announced that this tablet will be available in market from November 2011. Some of the feature which has been revealed on this occasion today in Delhi.

1. Skype chat should theoretically work, but no video chat.
2. 7-inch display only
3. GetJar apps store which is ironically older than Android market.
4. For students, it will be for $19 which is 50% the manufacturing cost for the masses it will be for $50.
5. It will support  Resistible display.
6. It has 366MHz processor + an dedicated HD processor.
7. No 3G supports.
8. Very good device for Education purpose.



:: - Comment / Remark (plz)
 
Copyright © CYBER HACKING