Laptops

shop with all senses

Recent Post

Monday, September 7, 2009

MOST DANGEROUS VIRUSES TILL NOW

MOST DANGEROUS VIRUSES TILL NOW
Causing close to 100 billion dollars in damage to businesses worldwide, PC viruses have brought the world a massive headache. We name the 10 most destructive of the past 20 years.
By George Jones,
TechWeb

Computer viruses are like real-life viruses: When they're flying around infecting every PC (or person) in sight, they're scary. But after the fact...well, they're rather interesting, albeit in a gory kind of way. With this in mind, we shamelessly present, in chronological order, the 10 most destructive viruses of all time.

CIH (1998)

Estimated Damage: 20 to 80 million dollars worldwide, countless amounts of PC data destroyed

Unleashed from Taiwan in June of 1998, CIH is recognized as one of the most dangerous and destructive viruses ever. The virus infected Windows 95, 98, and ME executable files and was able to remain resident in a PC's memory, where it continued to infect other executables.

What made CIH so dangerous is that, shortly after activated, it would overwrite data on the host PC's hard drive, rendering it inoperable. It was also capable of overwriting the BIOS of the host, preventing boot-up. Because it infected executable files, CIH wound up being distributed by numerous software distributors, including a demo version of an Activision game named Sin.

CIH is also known as the Chernobyl virus because the trigger date of certain strains of the virus coincides with the date of the Chernobyl nuclear reactor accident. The virus is not a serious threat today, thanks to increased awareness and the widespread migration to Windows 2000, XP, and NT, none of which are vulnerable to CIH.

Melissa (1999)

Estimated Damage: 300 to 600 million dollars

On Friday, March 26, 1999, W97M/Melissa became front-page news across the globe. Estimates have indicated that this Word macro script infected 15 to 20 percent of all business PCs. The virus spread so rapidly that Intel, Microsoft, and a number of other companies that used Outlook were forced to shut down their entire e-mail systems in order to contain the damage.

The virus used Microsoft Outlook to e-mail itself to 50 names on a user's contact list. The e-mail message contained the sentence, "Here is that document you asked for...don't show anyone else. ;-)," with an attached Word document. Clicking open the .DOC file -- and thousands of unsuspecting users did so -- allowed the virus to infect the host and repeat the replication. Adding insult to injury, when activated, this virus modified users' Word documents with quotes from the animated TV show "The Simpsons."

ILOVEYOU (2000)

Estimated Damage: 10 to 15 billion dollars

Also known as Loveletter and The Love Bug, this was a Visual Basic script with an ingenious and irresistible hook: the promise of love. On May 3, 2000, the ILOVEYOU worm was first detected in Hong Kong. The bug was transmitted via e-mail with the subject line "ILOVEYOU" and an attachment, Love-Letter-For-You.TXT.vbs. Similar to Melissa, the virus mailed itself to all Microsoft Outlook contacts.


The virus also took the liberty of overwriting music files, image files, and others with a copy of itself. More disturbingly, it searched out user IDs and passwords on infected machines and e-mailed them to its author.

An interesting footnote: Because the Philippines had no laws against virus-writing at the time, the author of ILOVEYOU was not charged for this crime.

Code Red (2001)

Estimated Damage: 2.6 billion dollars

Code Red was a computer worm that was unleashed on network servers on July 13, 2001. It was a particularly virulent bug because of its target: computers running Microsoft's Internet Information Server (IIS) Web server. The worm was able to exploit a specific vulnerability in the IIS operating system. Ironically, Microsoft had released a patch addressing this hole in mid-June.

Also known as Bady, Code Red was designed for maximum damage. Upon infection, the Web site controlled by the affected server would display the message, "HELLO! Welcome to http://www.worm.com! Hacked By Chinese!" Then the virus would actively seek other vulnerable servers and infect them. This would go on for approximately 20 days, and then it would launch
denial of service attacks on certain IP addresses, including the White House Web server. In less than a week, this virus infected almost 400,000 servers, and it's estimated that one million total computers were infected.

SQL Slammer (2003)

Estimated Damage: Because SQL Slammer erupted on a Saturday, the damage was low in dollars and cents. However, it hit 500,000 servers worldwide, and actually shut down South Korea's online capacity for 12 hours.

SQL Slammer, also known as Sapphire, was launched on January 25, 2003. It was a doozy of a worm that had a noticeable negative impact upon global Internet traffic. Interestingly enough, it didn't seek out end users' PCs. Instead, the target was servers. The virus was a single-packet, 376-byte worm that generated random IP addresses and sent itself to those IP addresses. If the IP address was a computer running an unpatched copy of Microsoft's SQL Server Desktop Engine, that computer would immediately begin firing the virus off to random IP addresses as well.

With this remarkably effective way of spreading, Slammer infected 75,000 computers in 10 minutes. The outrageously high amounts of traffic overloaded routers across the globe, which created higher demands on other routers, which shut them down, and so on.

Blaster (2003)

Estimated Damage: 2 to 10 billion dollars, hundreds of thousands of infected PCs

The summer of 2003 was a rough time for businesses running PCs. In rapid succession, IT professionals witnessed the unleashing of both the Blaster and Sobig worms. Blaster, also known as Lovsan or MSBlast, was the first to hit. The virus was detected on August 11 and spread rapidly, peaking in just two days. Transmitted via network and Internet traffic, this worm exploited a vulnerability in Windows 2000 and Windows XP, and when activated, presented the PC user with a menacing dialog box indicating that a system shutdown was imminent.

Hidden in the code of MSBLAST.EXE -- the virus' executable " were these messages: "I just want to say LOVE YOU SAN!!" and "billy gates why do you make this possible? Stop making money and fix your software!!"


The virus also contained code that would trigger a distributed denial of service attack on windowsupdate.comon April 15, but Blaster had already peaked and was mostly contained by then.

Have you read it? Dangerous isn't it? ok i got a collection of virus here.. i share this not to infect you or the others but to give you an idea what is virus really look like.. dont you even try to pass this to others this are already been detected by the anti-virus program. if you don't to put yourself into trouble behave yourself!

ADOBE CS3 KEYGENS



RAPIDSHARE LINK
KEYGEN----1

OTHER LINKS
KEYGEN---2



shijey@warezdownloader.ucoz.com

WindowsMediaCenter TV Pack 2008 RTM (x86)



Windows Media Center TV Pack 2008 RTM (x86)
Windows Media Center TV Pack 2008 - presented more recently company Microsoft, it is established on OEM licences since July, 17th, 2008 and it is far not on all sold computers. Will not deprive ourselves delectations - to take advantage of results of long and laborious work Microsoft on creation TV Pack 2008 to Windows Media Center.

"Microsoft has finished testing Fiji - updatings for Windows Media Center, and prepares it for release under name Windows Media Center TV Pack 2008.
Microsoft has informed the testers, that code Fiji is sent on gold on July, 17th: Windows Media CenterTV Pack 2008, known under code name Fiji, has reached phases RTM. Data of a feedback from users have appeared invaluable for the given product and the command of developers wishes to thank each of you for given data about errors.
Windows Media Center TV Pack has been let out on July, 16th, 2008. Pay attention, not all computers accessible in retail networks, are on sale with established Windows Media Center TV Pack ".©


"Microsoft Connect wrote:
1. Prepare a machine with clean install of Windows Vista Service Pack 1.
a. The machine will need to meet or exceed the minimum hardware requirements for Windows Vista.
2. The Windows Vista Service Pack 1 operating system must be Windows Vista Home Premium or Ultimate (x86)
3. Following operating system install, do not launch Windows Media Center or go through Windows Media Center Setup
4. Install Windows Media Center TV Pack 2008
a. Windows Media Center TV Pack 2008 (x86)
b. Install the PlayReady PC Runtime (x86)
5. Install the following patches
a. KB951685 - The video playback application stops responding when you watch video or Live TV on a Windows Vista-based computer
b. KB950754 - Noticeable problems occur in the video when you use the DirectSound renderer on Windows Vista
6. Install any required or recommended Windows Updates
7. Launch Windows Media Center and go through Windows Media Center Setup
All set forth above and concerning installation - is available in archive

Rather than doing a clean install, you can (I believe) do an in place upgrade to get the same result. During install, if you have already configured the SP1 media center, if gives you the option to install anyway with the risk of lost settings and undetectable TV tuners so try it at your own risk.

Note: This is the x86 version only.
Update: The build string for this is "6.1.1000.18273" which is the RTM build according to support.microsoft.com
Update 2: I installed the TV pack without doing anything to my (decidedly not clean) vista install without any problems, all I had to do was run through the setup for my (usb) TV Tuner again (though I did unplug it before running the setup)".


DOWNLOAD LINK:

http://rapidshare.com/files/148428413/windows_media_center_tv_pack_2008_x86_appzarena.com.rar

MacDrive 7









http://rapidshare.com/files/148427885/macdrive_7.1.0_s-master_appzarena.com.rar

EARTH DESK PRO V3.5


Real-time clouds (updated at 3-hour intervals) with transparency and moonlight reflection.
Accurate sun, moon and city lighting. High quality twilight shading.
Automatically updates when waking from sleep.
Moonlight shading can be turned on or off.
Complete multi-display support.
Eleven different map projections.
Includes both satellite and political maps.
Multiple projections & Multiple monitors.
EarthDesk’s wide variety of map projections gives you complete control over the maps on your desktop.EarthDesk runs in the background on your PC, keeping your desktop up-to-date.
Track hurricanes and typhoons.
With an internet connection, EarthDesk displays real-time global cloud cover, allowing users to track hurricanes and typhoons, or simply admire our beautiful planet. User options allow you to adjust the overall transparency of the cloud layer.
Unique to EarthDesk is accurate rendering of moonlight on the Living Earth satellite map. To create this stunning effect, the phase of the moon and reflectiveness of the Earth’s surface are used to determine correct coloring of the image, ensuring a realistic view of the Earth from space.Customization
EarthDesk gives you numerous options for configuring map images on your desktop.Maps can be centered on a city, so that the map remains stationary while the sun and moon move. Alternatively, the map center may be locked to the position of the sun or moon so that the shadow remains fixed, while the map moves.
Like a Swiss watch.
EarthDesk uses the same Atlas database technology as Time Palette, providing the application with detailed geographical and time zone information for 10,000 cities throughout the world.
The Atlas maintains comprehensive rules for Daylight Saving Time (Summer Time), giving EarthDesk a level of accuracy unmatched by other applications.
Customization
EarthDesk gives you numerous options for configuring map images on your desktop.
Maps can be centered on a city, so that the map remains stationary while the sun and moon move. Alternatively, the map center may be locked to the position of the sun or moon so that the shadow remains fixed, while the map moves.
For example, by centering on the subsolar point, the map will move throughout the day so as to keep the sun in the center of the screen. EarthDesk automatically conforms its maps to the aspect ratio of your screen, for a perfect fit with adjustable zoom control.
For example, by centering on the subsolar point, the map will move throughout the day so as to keep the sun in the center of the screen. EarthDesk automatically conforms its maps to the aspect ratio of your screen, for a perfect fit with adjustable zoom control.


Download Limk::

VIRTUAL DJ PRO 5.2









VirtualDJ is the hottest MP3 mixing software, targeting every DJ from bedroom DJs to professional superstars like Carl Cox.
With its breakthrough BeatLock engine, your songs will always stay in the beat, and you can work your mixes incredibly faster than any other DJ could.

The automatic seamless loop engine and the brand new synchronised sampler will let you perform astounding remixes live, with no preparation at all.
The visual representation and the cues allow you to clearly see the song's structure, and never be surprised by a break anymore.
The vinyl controls will let you scratch like on a real turntable, except that with the beatlock engine your scratches will never end out of the beat.

Add to that an infinite number of cue points you can save for each songs, a bunch of wonderful effects automatically beat-synchronised.

Add also several interfaces to suit everybody from the beginner to the professional DJ, the possibility to record your mixes to burn them on CDs, to broadcast on the Internet and have your own radio station, to save your CDs directly in MP3, to use a headphone to preview the songs or an external mixtable to perform in a club.

Lastly, enter the new era of DJs by mixing video clips (DVD, DivX, MPEG...) which you can send on a giant screen.

Virtual DJ brings you all that, in the most easy-to-use way, and at the most affordable price.



http://rapidshare.com/files/144117374/atomix_virtual_DJ_pro__v5.2_s-master_appzarena.com.rar

FLStudio XXL PRODUCTION TUTORIAL



FL Studio XXL Producer Edition 8.0 With Tutorials & Sound Packs - 230MB

DOWNLOAD LINKS:

http://rapidshare.com/files/131274567/FL_Studio_XXL_Producer_Edition_8.0_With_Tutorials___Sound_Packs.part1.rar

http://rapidshare.com/files/131304094/FL_Studio_XXL_Producer_Edition_8.0_With_Tutorials___Sound_Packs.part2.rar

http://rapidshare.com/files/131307242/FL_Studio_XXL_Producer_Edition_8.0_With_Tutorials___Sound_Packs.part3.rar

http://rapidshare.com/files/131316240/FL_Studio_XXL_Producer_Edition_8.0_With_Tutorials___Sound_Packs.part4.rar


Mobile Cheat Stuff



NOKIA

1 Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger.

Nokia instrument comes with a reserve battery. To activate, key is "*3370#"

Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.

This reserve will get charged when u charge ur cell next time.

*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%
#3370# Deactivate Enhanced Full Rate Codec( EFR)


*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound
but you should gain approx 30% more Talk Time
*#4720# Deactivate Half Rate Codec

2 *#0000# Displays your phones software version,

1st Line :S oftware Version,
2nd Line : Software Release Date,
3rd Line : Compression Type
3 *#9999# Phones software v ersion if *#0000# does not work

4 *#06# For checking the International Mobile Equipment Identity (IMEI Number)

5 #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

6 #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

7 #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w" and "+" symbols)

8 #pw+1234567890+4# SIM Card Lock Status.(use the "*" button to obtain the "p,w" and "+" symbols)

9 *#147# (vodafone) this lets you know who called you last *#1471# Last call (Only vodofone)

10 *#21# Allows you to check the number that "All Calls" are diverted To

11 *#2640# Displays security code in use


12 *#30# Lets you see the private number

13 *#43# Allows you to check the "Call Waiting" status of your phone.

14 *#61# Allows you to check the number that "On No Reply" calls are diverted to

15 *#62# Allows you to check the number that "Divert If Unrea chable(no service)" calls are diverted to

16 *#67# Allows you to check the number that "On Busy Calls" are diverted to

17 *#67705646#R emoves operator logo on 3310 & 3330

18 *#73# Reset phone timers and game scores

19 *#746025625# Displays the SIM Clock status, if your phone supports this power saving feature "SIM Clock Stop Allowed", it
means you will get the best standby time possible

20 *#7760# Manufactures code

21 *#7780# Restore factory settings

22 *#8110# Software version for the nokia 8110

23 *#92702689# (to rember *#WAR0ANTY#)

Displays -
1.Serial Number,
2.Date Made
3.Purchase Date,
4.Date of last repair (0000 for no repairs),
5.Transfer User Data.
To exit this mode -you need to switch your phone off then on again

24 *#94870345123456789# Deactivate the PWM-Mem

25 **21*number# Turn on "All Calls" diverting to the phone number entered

26 **61*number# Turn on "No Reply" diverting to the phone number entered

27 **67*number# Turn on "On Busy" diverting to the phone number entered

Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button



Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).

Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©
 

My Blog List