Friday, August 5, 2011


Viruses: Destroying your systems for 25 years

By: 
At DefCon 19, F-Secure Chief Technical Officer Mikko Hyponnen shows off a 5 1/4-inch floppy that has on it the first PC virus.
(Credit: Seth Rosenblatt/CNET)
LAS VEGAS--The hacker conference DefCon kicked off this morning with the rare public sighting of a now-archaic piece of technology: the 5 1/4-inch floppy disk. Mikko Hyponnen, the chief technical officer for the Finnish security company F-Secure, waved the disk above his head to start off his history of PC viruses, and said, "This is Brain."
Hyponnen was talking about a guest of honor housed on the disk: the original computer virus. Hyponnen found the disk last year in a lockbox in F-Secure's headquarters in Helsinki, and he dove in, cracked the virus code, and found in it the names and address of the virus' writers, two brothers from a town near Lahore, Pakistan. And--believe it or not--he went to the address and found the same brothers there, now running an Internet service provider called Brain Communications. (Hyponnen details his trip in a short YouTube film.)
One of the important things he learned from them is that they said they had no malicious intent when they created the virus. "There was no real motive," said Hyponnen. It was a proof-of-concept, created just to prove that it could be done. This was to inform computer virus development until the first years of the new century, as viruses grew more malicious and complicated, but were essentially pranks.
Just because they were pranks doesn't mean they weren't harmful, though. Hyponnen demonstrated a number of early computer viruses from which he had removed the infectors, including one called Disk Destroyer. This particular piece of nastiness would copy the contents of your hard disk into the RAM, then wipe your drive. It then loaded a rudimentary slot machine-style game, and gave you five chances to win. If you won, it would reload your data back onto your hard drive. If you lost, your data was permanently wiped out.
Though viruses continued to get more and more complex, it wasn't until 2003 that things began to change. First, Microsoft began to take computer viruses seriously, he said, because worm infections were causing serious Internet traffic packet loss and causing real-world damage. Trains in 2003 were stopped around Washington, D.C., because the Windows computers controlling the signals and routing systems had crashed. "This is the basic reason why serious problems like these were finally taken seriously," Hyponnen noted.
Here, Hyponnen highlights the part of the Brain code that shows the names and address of its authors.
(Credit: Seth Rosenblatt/CNET)
The other major change in 2003 was the Fizzer infection. "Fizzer, which nobody here remembers, is one of the most important viruses in history. It was the first virus written with one purpose only: making money." Fizzer spread e-mail spam in an effort to rake in the dough. Hyponnen said that when other virus writers realized they too could earn some bucks from writing malicious code, it was game on.
This began to have even more serious real-world implications, as some virus writers were found to have used their money to buy equipment for fighters in Iraq.
"We also began to see a geographical shift [in] where viruses were written," he said. "From 1986 to 2003, it was mostly Western countries, the U.S., Western Europe, Japan. From 2003 on, it was Russia, Eastern Europe, Ukraine, China (of course), and South America, especially Brazil."
However, Hyponnen said the problem was not only limited to criminals. He called out the president of Sony BMG, Thomas Hesse, to calls of derision from the audience. Hesse was instrumental in approving a DRM system that surreptitiously installed a rootkit on your computer when you played a CD from that computer. "Sony gets a lot of hate, and they deserve it. Of course, some would claim that if you listen to Celine Dion, you get what you deserve," Hyponnen quipped.
But he especially called out Hesse for saying, "Most people, I think, don't even know what a rootkit is, so why should they care about it?" Hyponnen retorted, "Most people don't even know what brain damage is, so why should they care about it, too?"
Hyponnen shows a text file in modern ransomware, which refuses to free your computer unless you pay the virus writers.
(Credit: Seth Rosenblatt/CNET)
Hyponnen talked about the technical complexity of the 2008 virus Mebroot, a trojan that infects the master boot record of computers and is exceptionally difficult to remove because of it, and ransomware like GPCode, which holds your computer hostage until you wire money to the virus writers. Stuxnet, though, was an embarrassment for the security industry, Hyponnen said.
"All this work did not prepare us for what we found next. It was embarrassing. We missed Stuxnet for a freaking year," he said, shaking his head.
"Today when you get infected by viruses, you will not know," Hyponnen said. "It's running silently in the background. It won't slow down your system, and it won't take up too much of your resources."
"It has been a pretty wild ride over the past 25 years, from Brain to Stuxnet. Many things have changed, many things haven't changed. Brain didn't spread on the Internet, it didn't exist," Hyponnen said, alluding to the spread by floppy disk. "And Stuxnet spread by USB key

Thursday, August 4, 2011

Harry Potter! casts windows commands!


hai guys ..

Did you ever wanted to use spells like Harry Potter? With a little work, and some voice recognition, this can be mastered.

Things you need for this project:
  • A computer with Windows XP or Vista
  • A microphone
  • Some time and patience!
If you enjoyed this Instructable, hit me up with a plus! Thanks. :D

Featured on Gizmodo.
 

Step 1Download Voice Activiation Command Software

I simply googled the term, and Voice Activated Commands came up as the first choice. This program serves a useful purpose in RPGs and other computer games where voice commands can be given rather than typing in key combos. For this project, it can be used to cast "spells" on your computer to manipulate it to do your bidding.
****** ****** ****** ****** ****** ****** ****** ****** ****** ****** ****** ****** ****** ****** 

Step 2Grab Some Spells And Plug 'em in!

For researching all of those tip-of-the-tongue-can't-quite-remember spells, the coolest place I found wasMuggleNet. It's the cream of the crop as Harry Potter fan sites go. Their spells section is extensive and gives a description of each spell.

Some sample spells:
Lumos
  • Brighten Screen
Nox
  • Dim Screen
Petrificus Totalus
  • Hibernate
Silencio
  • Mute
Sonorous
  • Volume Up
Stupefy
  • Stop In Web Browser
Evanesco
  • Exit application
Also, I made an action called "Marauder's Map" which is activated by saying "I solemnly swear I am up to no good." which opens the browser to the home page.

###### ###### ###### ###### ###### ###### ###### ###### ###### 

Step 3Enter the Incantations


Boot up VACBuilder and create a new profile. Name it whatever you like: I did Harry Potter as an example.

Next, you want to start making spells. You go into the "Action Description" box and hit the "Add" button. Enter the spell name and click "OK".

After this, go over to the "Command List" box. This is where you will program what will happen when a certain phrase is said. Qualifier keys can be anything from "Alt" to "Shift", so just explore both lists. The extended keys reach almost anything, including browser commands and media player commands.

If you want to make sure you have the right key, boot up the Keyboard Tester program that came with VAC. Click the button in the top left to change it from "Disabled" to "Enabled". When enabled, your keyboard will light up buttons when you push them.

You can do multiple things with one voice command.. Just add another command and repeat the last step.

The "Command Attributes" can be used for more personal commands, dealing with the duration the combo is held, the pause before it is executed, and the number of times to repeat the combo.

"Profile Activation Keys" deal with activating and deactivating the voice commands by using key combos. I didn't bother with these in my project, but you certainly can if the mood strikes you.

Finally, you want to test your phrase to make sure the computer can recognize the voice commands. To do this, simply hit the "Test Phrase" button in the bottom right corner. If it matches your voice command with the correct spell, you're golden. If it doesn't just try again or pick a different phrase to say.

And of course, save your profile with the button in the bottom right before you close.

$$$$$ $$$$$ $$$$$ $$$$$ $$$$$ $$$$$ $$$$$ $$$$$ $$$$$ 

Step 4Categories


If you are going to be using this program for more than one project, you may want to make categories for the different commands. To do this, go into "Tools" and "Category Setup". Hit "Add", make one, and hit "Okay." To add spells to a category, right click them in the "Action Description" box, go into "Category", and click the one you made for it.

!!!!!!! !!!!!!! !!!!!!! !!!!!!! !!!!!!! !!!!!!! !!!!!!! !!!!!!! !!!!!!! !!!!!!! 

"" ""
Action: Marauder's Map
    Cmds 1: NONE - BROWSER_HOME - 
    Phrase 1: I solemnly swear I am up to no good.
Action: Lumos
    Cmds 1: NONE - NONE - 
    Phrase 1: Loomis
Action: Nox
    Cmds 1: NONE - MENU - 
    Phrase 1: Nox
Action: Petrificus Totalus
    Cmds 1: NONE - NONE - 95
    Cmds 2: NONE - NUM_LOCK - 
    Cmds 3: NONE - CAPS_LOCK - 
    Phrase 1: Petrificus Totalus
Action: Silencio
    Cmds 1: NONE - VOLUME_MUTE - 
    Phrase 1: Silencio
Action: Sonorus
    Cmds 1: NONE - VOLUME_UP - 
    Phrase 1: Sonorus
Action: Stupefy
    Cmds 1: NONE - BROWSER_STOP - 
    Phrase 1: Stupefy
Action: Evanesco
    Cmds 1: ALT - F4 - 
    Phrase 1: Evanesco
Action: Finite
    Cmds 1: NONE - END - 
    Phrase 1: finite
"" ""
http://www.instructables.com/files/orig/F4F/7XGK/F48VEZT2/F4F7XGKF48VEZT2.wmv
;) ua done now
;D
do not forget to come back for another new post.

Saturday, July 9, 2011

How to Hack Symbian S60 Phones to Install Unsigned Applications:

If you own a Nokia Symbian S60 phone, you will most likely be aware of the fact that it is not possible to install applications on it unless they are signed using a valid certificate. Have you been trying to install applications on your S60 3rd or 5th edition phone but ending up getting a certificate error? At times, this can be really annoying; but here is a smart solution to this problem!


Here in this post, I will show you how to hack your Symbian S60 3rd or 5th edition smartphone, so as to modify the phone’s firmware and completely bypass the mandatory signing requirement. So, once you are done with this one time hack, you should be able to install any compatible application including unsigned and those with an expired certificate.
 
What is the Need for Signing Applications?
From the 3rd edition onwards, all the Symbian S60 applications need to be signed in order to ensure their integrity, so that it would not be possible for a third party to tamper with the application. Also, signing ensures that you always install applications from a trusted source.
However, there are many freeware and beta applications that come unsigned as the developers cannot afford to buy a symbian certificate. Hence, it can be a real nightmare for the users who need to install such applications on their phones. So, here is a step-by-step procedure to hack your phone and permanently disable this security feature.
 
1. Download HelloOX2 V2.03 or the latest version from the HelloOX2 Ofiicial Website.
HelloOX2 is an excellent tool to hack Symbian S60 3rd, 5th and Symbian^3 smartphones which makes it possible to install a root certificate by gaining full access to the phone’s system files. With this capability, you can install anything you want on your phones without the need to worry about the annoying certificate error!
2. The signed version of HelloOX2 demands for a donation and hence, only the unsigned version is available for free download. So, if you have the unsigned version, you need to sign it before installing on your phone. In order to sign any application, you need to have the certificate and the key file which can be obtained as follows:
  • Go to the OPDA Website, get registered and login to your account.
  • Click on the “Apply Certificate” tab, enter the model number and the IMEI of your phone and then click on “Submit and Upload” button.
  • It will usually take up 24 hours for your certificate and key file to be generated and uploaded. To check the status of your certificate click on “My Certificate” tab. If the certificate is ready for the download you will see something as follows:
OPDA Certificate Status



 
  • Download the certificate and the key file on to your computer. Also download the SisSigner tool to sign your HelloOX2 application.
  • Open the SisSigner, load the HelloOX2.sis, certificate and the key file as shown below and click on “Sign”. Leave the “Key File Password” field blank.
SisSigner








  • Your HelloOX2 application is now signed and ready for the installation.
3. Install the signed HelloOX2 application on your phone and run it to start the hacking process, which is completely automatic. Within a minute your phone will be hacked. Once this is done, say goodbye to the annoying certificate error and install any application.
I hope you like this post.
please express your opinion through comments. Enjoy!!!

How to Create Your Own Customized Run Commands

How to Create Your Own Customized Run Commands

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

 
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
Create Shortcut
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
thats it.!

I hope you like this post! Pass your comments.