Tuesday, February 2, 2010

IM tricks

Multiple Login to Yahoo Messenger
You can login to yahoo messenger using multiple ids at a time on a single computer.
Just follow these steps.
1.Open register editor (press winkey+r n type regedt32)
2.using left panel go to following path
HKEY_current_user\Software\yahoo\pager\test
3. Right click on right pane and select DWORD
4. name that DWORD and name that Plural
5. double click on it and set the value to 1.
open as much messenger as u can and login with different ids on the same computer.


Find out whether anyone have blocked u on Gtalk
Some basic step and find whether anyone have blocked u
1.open the chat box by clicking on the name of the person u wanna find about.
2.on the 4th option icon and select "go off the record".
3. now type anything in the chat box.
4. if u r blocked and nothing will be in reply (a system reply) and if the peron is offline then a message will come in red color saying the person is offline.

Tuesday, July 15, 2008

Some family of viruses







Custom Search


ip information
There are so many viruses available today. Some of the Viruses have there complete family.Some of the very famous family of viruses are following in brief...........
Stealth:-
These viruses are invisible. They Hooks Dos Call to infected files disc sectors and substituting uninfected information area with themselves. These may be responsible of
• self modifications
• Encryption with variable keys
Fish#6:-
These viruses used to hook with INT 13h,21h and write themselves at the end of com files that are executed or closed.
On a very special day when date ,number of month equate to each other then this viruses erases the win drive. These viruses contains the string
"Don't trouble trouble until trouble troubles you."
They encrypt themselves in TSR code as well as infected files. The virus received the INT 21h call, the it decrypts its TSR codes; processes that call and then encrypt before to return to the original INT handler.
Frodo:-
When installing into the system memory these viruses occupy the top addresses as a result of DOS re-loads command.com and the virus hide the block of the memory that is occupied by TSR virus Copy.
This is one of the 1st virus that uses quite complex stealth routine. That routine intercept and handles 20 functions and 21h (Find find first find next read close exec etc.) and effectively hides the virus in the infected files.
*When DOS file tries to access infected files the virus substitute its original length and date time stamp.
Along with these type of viruses there are so many family of viruses are still exit which are very dangerous. The all family of viruses i described above belongs to boot sector viruses.
I'll be back soon with some more details of these type of more viruses............