Check these online earning site...
Join #1 Affiliate Program and earn $70.00 If you own a website.
Are these fake or genuine...
Thursday, October 22, 2009
Viruses in Mahendranagar
The viruses mainly found in Infected Computers of Mahendranagar are listed below. These viruses are just disgusting. Is your system infected from anyone of these? Go through the list.
Viruses Name
1. Backdoor.Formador
2. Backdoor.Graybird
3. Backdoor.Trojan
4. Bloodhound.VBS.4
5. Bloodhound.W32.1
6. Downloader
7. Eek (b)
8. Infostealer.Bancos
9. Infostealer.Banker.C
10.Infostealer.Gampass
11.Joke Program
12.Packed.Generic.76
13.Packed.Generic.248
14.Spyware.ActMon
15.Spyware.GiveMeToo
16.Spyware.InvisibleKey
17.SymbOS.Beselo.A
18.SymbOS.Hatiha
19.SymbOS.Commarrior.C
20.Trojan Horse
21.Trojan.Dropper
22.Trojan.Packed.NsAnti
23.USBcillin
24.VBS.Redlof.A
25.VBS.Redlof.B
26.VBS.Runauto
27.VBS.Solow
28.VBS.Soraci
29.W32.Blackmal.E@mm
30.W32.Botou
31.W32.Bufei
32.W32.Downadup.B
33.W32.Downadup!autorun
34.W32.Gammima.AG
35.W32.Glupzy.A
36.W32.Imaut
37.W32.Imaut.A
38.W32.Induc.A
39.W32.IRCbot
40.W32.Ircbrute
41.W32.Mydoom.AX@mm
42.W32.Mydoom.M@mm
43.W32.Narcha
44.W32.Pasobir
45.W32.Rajump
46.W32.Rontokbro@mm
47.W32.Sality.AE
48.W32.Sality.U
49.W32.SillyDC
50.W32.SillyFDC
51.W32.SillyP2P
52.W32.Svich
53.W32.Wullik@mm
54.W32.Wullik.B@mm
Waiting for others...
Note: These viruses named by Standard AntiVirus of Symantec Corporation.
Viruses Name
1. Backdoor.Formador
2. Backdoor.Graybird
3. Backdoor.Trojan
4. Bloodhound.VBS.4
5. Bloodhound.W32.1
6. Downloader
7. Eek (b)
8. Infostealer.Bancos
9. Infostealer.Banker.C
10.Infostealer.Gampass
11.Joke Program
12.Packed.Generic.76
13.Packed.Generic.248
14.Spyware.ActMon
15.Spyware.GiveMeToo
16.Spyware.InvisibleKey
17.SymbOS.Beselo.A
18.SymbOS.Hatiha
19.SymbOS.Commarrior.C
20.Trojan Horse
21.Trojan.Dropper
22.Trojan.Packed.NsAnti
23.USBcillin
24.VBS.Redlof.A
25.VBS.Redlof.B
26.VBS.Runauto
27.VBS.Solow
28.VBS.Soraci
29.W32.Blackmal.E@mm
30.W32.Botou
31.W32.Bufei
32.W32.Downadup.B
33.W32.Downadup!autorun
34.W32.Gammima.AG
35.W32.Glupzy.A
36.W32.Imaut
37.W32.Imaut.A
38.W32.Induc.A
39.W32.IRCbot
40.W32.Ircbrute
41.W32.Mydoom.AX@mm
42.W32.Mydoom.M@mm
43.W32.Narcha
44.W32.Pasobir
45.W32.Rajump
46.W32.Rontokbro@mm
47.W32.Sality.AE
48.W32.Sality.U
49.W32.SillyDC
50.W32.SillyFDC
51.W32.SillyP2P
52.W32.Svich
53.W32.Wullik@mm
54.W32.Wullik.B@mm
Waiting for others...
Note: These viruses named by Standard AntiVirus of Symantec Corporation.
Saturday, September 26, 2009
Nepal Telecom (NT) Resumed Namaste Balance Transfer Service.
Happy Dashain... to all...
Due to technical reason, balance transfer facility in GSM Prepaid Mobile Service which was temporarily disabled is now activated/resumed from 2066-06-09 Friday.
Happy Transferring...
Nepal Telecom has resumed USSD Prepaid Balance Transfer Service.
Definition:- USSD (Unstructured Supplementary Service Data) is a Global System for Mobile(GSM) communication technology that is used to send text between a mobile phone and an application program in the network. Applications may include prepaid roaming or mobile chatting.
Due to technical reason, balance transfer facility in GSM Prepaid Mobile Service which was temporarily disabled is now activated/resumed from 2066-06-09 Friday.
Happy Transferring...
Nepal Telecom has resumed USSD Prepaid Balance Transfer Service.
Definition:- USSD (Unstructured Supplementary Service Data) is a Global System for Mobile(GSM) communication technology that is used to send text between a mobile phone and an application program in the network. Applications may include prepaid roaming or mobile chatting.
Sunday, July 26, 2009
GPRS & CRBT enabled by Nepal Telecom for MAHENDRANAGAR...
Now the users of NAMASTE Prepaid Mobile can use the facilities like GPRS & CRBT in their mobiles, The service was enable in MAHENDRANAGAR 2 days ago.
Check for CRBT here = http://crbt.ntc.net.np/colorring/index.jsp
Example : Type REG and send sms to 1455
Type DEF 0160000167 and send sms to 1455
Type MR 0160000167 and send sms to 1455
For New Tunes setting;
Type DEF xxxxxxxxxx and send sms to 1455
Type MR xxxxxxxxxx and send sms to 1455
Here, xxxxxxxxxx = new code of new tune.
Check for GPRS here = http://www.ntc.net.np/mobile/mob_gprsConfig.php
Example : Type V_GPRS and send sms to 1400
You will receive the message "Thank you for subscribing GPRS service. You will be connected by 5 PM next working day: Nepal Telecom."
Note: The above method will not work, you have go to NEPAL TELCOM Office and Fill up the form, your name & mobile number in which GPRS is to activated and pay NRs.113 and the connection will be activated next working day in the day time.
For GPRS & CRBT, check the given links above...
Check for CRBT here = http://crbt.ntc.net.np/colorring/index.jsp
Example : Type REG and send sms to 1455
Type DEF 0160000167 and send sms to 1455
Type MR 0160000167 and send sms to 1455
For New Tunes setting;
Type DEF xxxxxxxxxx and send sms to 1455
Type MR xxxxxxxxxx and send sms to 1455
Here, xxxxxxxxxx = new code of new tune.
Check for GPRS here = http://www.ntc.net.np/mobile/mob_gprsConfig.php
Example : Type V_GPRS and send sms to 1400
You will receive the message "Thank you for subscribing GPRS service. You will be connected by 5 PM next working day: Nepal Telecom."
Note: The above method will not work, you have go to NEPAL TELCOM Office and Fill up the form, your name & mobile number in which GPRS is to activated and pay NRs.113 and the connection will be activated next working day in the day time.
For GPRS & CRBT, check the given links above...
Sunday, July 19, 2009
NTC Prepaid NAMASTE Subscribers...
Now NTC Namaste Subscribers of Mahakali Zone of Far Western Region, Nepal can send sms to number 2004. It's open from 2066-04-04 Sunday. Before the sms system was not working due to technical reason.
Type Klik & send it to 2004,
You will get Lucky Number,
According to which you can play live on NTV @ 9:20 PM Tuesday... for different draws...
Win exciting prizes... & have fun...
Channel : Nepal Television (NTV)
Program Time : 9:20 PM Tuesday
Program Name : Klik Klik Klik Klik
Repeat Telecast : Tuesday 11 PM, Friday 12 PM, Sunday 2:30 PM
SMS Number : 2004
Visit http://www.pas.com.np for more information regarding the terms & conditions...
Thanks!
Type Klik & send it to 2004,
You will get Lucky Number,
According to which you can play live on NTV @ 9:20 PM Tuesday... for different draws...
Win exciting prizes... & have fun...
Channel : Nepal Television (NTV)
Program Time : 9:20 PM Tuesday
Program Name : Klik Klik Klik Klik
Repeat Telecast : Tuesday 11 PM, Friday 12 PM, Sunday 2:30 PM
SMS Number : 2004
Visit http://www.pas.com.np for more information regarding the terms & conditions...
Thanks!
Saturday, July 18, 2009
Escape from Autorun Viruses...
You can analyze almost all autorun viruses from the following code:
Open Notepad
Copy the Code below
>>>>>>
echo "Run in HKLM" > %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Runonce in HKLM" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "RunonceEX in HKLM" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Winlogon in HKLM" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Run in HKCU" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKCU\Software\Microsoft\Windows\CurrentVersion\Run %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "InternetSettings in HKCU" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Explorer in HKCU" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
>>>>>>
Save it as abc.bat anywhere you like.
Double Click on the file
Now go to Start>Run and Type : notepad %SYSTEMROOT%\tofile.txt
Happy Removal of Autorun Viruses...
Open Notepad
Copy the Code below
>>>>>>
echo "Run in HKLM" > %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Runonce in HKLM" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "RunonceEX in HKLM" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Winlogon in HKLM" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Run in HKCU" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKCU\Software\Microsoft\Windows\CurrentVersion\Run %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "InternetSettings in HKCU" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
echo "Explorer in HKCU" >> %SYSTEMROOT%\tofile.txtREG EXPORT HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer %SYSTEMROOT%\tofile1.txttype %SYSTEMROOT%\tofile1.txt >> %SYSTEMROOT%\tofile.txt
>>>>>>
Save it as abc.bat anywhere you like.
Double Click on the file
Now go to Start>Run and Type : notepad %SYSTEMROOT%\tofile.txt
Happy Removal of Autorun Viruses...
Welcome!
Lets start our blog from here... You are heartly welcome to this blog... Be informed with latest information regarding Information Technology and miscellaneous matters... Thanks!
Subscribe to:
Posts (Atom)