03 September 2011

Blue Screen Of Death (BSOD)

 A Blue Screen Of Death, or officially known as the STOP Error is a system crash happening due to hardware or driver(software) errors. A STOP Error can also be caused by a critical boot loader error, where the operating system is unable to start from the bootable drive due to the presence of an incorrect disk driver, a damaged file system, or a similar problem.

The Blue Screen of Death

While it may seem odd to think about purposefully causing a Blue Screen Of Death (BSOD), Microsoft includes such a provision in Windows XP (Vista also). This might come in handy for testing and troubleshooting your Startup And Recovery settings, Event logging, and for demonstration purposes.

Here's how to create a BSOD:

Launch the Registry Editor (Regedit.exe).
Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters.
Go to Edit, select New | DWORD Value and name the new value CrashOnCtrlScroll.
Double-click the CrashOnCtrlScroll DWORD Value, type 1 in the Value Data textbox, and click OK.
Close the Registry Editor and restart Windows XP.
When you want to cause a BSOD, press and hold down the [Ctrl] key on the right side of your keyboard, and then tap the [ScrollLock] key twice. Now you should see the BSOD.

If your system reboots instead of displaying the BSOD, you'll have to disable the Automatically
Restart setting in the System Properties dialog box. To do so, follow these steps:

Press [Windows]-Break.
Select the Advanced tab.
Click the Settings button in the Startup And Recovery panel.
Clear the Automatically Restart check box in the System Failure panel.
Click OK twice.

Here's how you remove the BSOD configuration:

Launch the Registry Editor (Regedit.exe).
Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\i8042prt\Parameters.
Select the CrashOnCtrlScroll value, pull down the Edit menu, and select the Delete command.
Close the Registry Editor and restart Windows XP.
Note: Editing the registry is risky, so make sure you have a verified backup before making any changes.

Additional Note on the steps provided to create a BSOD :
Hackers can make use of this trick to crash your computer over and over again by simply creating a .vbs or .bat file which will change the values in the Registry, and then pressing the keys needed automatically.

References:
-http://en.wikipedia.org/wiki/Blue_Screen_of_Death
-http://psacake.com/web/jr.asp

Fixing the BSOD : http://support.microsoft.com/kb/958233


Thank you for reading.
Cyber Frost

02 August 2011

Types of Computer Viruses

Bootsector Virus:
A virus which attaches itself to the first part of the hard disk that is read by the computer upon bootup. These are normally spread by floppy disks.

Note: Floppy disks are kind of outdated, so, perhaps, it's spread through portable hard disks or boot CDs.

Macro Virus:
Macro viruses are viruses that use another application's macro programming language to distribute themselves. They infect documents such as MS Word or MS Excel and are typically spread to other similar documents.

This is a nightmare to every office workers. Once your computer is infected, your whole documents will be destroyed. So, always do backups!
 

Memory Resident Viruses:
Memory Resident Viruses reside in a computers volitale memory (RAM). They are initiated from a virus which runs on the computer and they stay in memory after it's initiating program closes.

Rootkit Virus:
A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. The term rootkit comes from the linux administrator root user. These viruses are usually installed by trojans and are normally disguised as operating system files.

Polymorphic Viruses:
Well, poly means many and morph means form. So, this type of virus will replicate itself into many forms of file. Now, you might see it as a .pdf file. Next time you log in, it might have changed itself into a .dll file. It is extremely difficult to detect manually. Even some antivirus might miss it while scanning for viruses.

Logic Bombs/Time Bombs:
These are viruses which are programmed to initiate at a specific date or when a specific event occurs. Some examples are a virus which deletes your photos on Halloween, or a virus which deletes a database table if a certain employee gets fired.

This is my favorite type of virus, it is completely unpredictable, only the coder of the virus knows what will happen and when it will happen.
DeepFreeze might be able to counter this type of virus.

Important Note:
Knowing that viruses have a very big effect on your computer, you might want to update your firewalls and antivirus for protection. Everyday, hundreds(maybe thousands) of new viruses are made, with even more creative ways of infecting and surviving.

So, always keep your antivirus and firewalls up-to-date. However, do not get trapped by those fake antivirus providers. Only use trusted antivirus brands, such as Avira, Norton, AVG(Grisoft), and NOD32.


Thanks for reading.
Cyber Frost

31 July 2011

The Difference Between a Virus, a Worm, and a Trojan Horse

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.

One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.

What Is a Virus?

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.

What Is a Worm?

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

What Is a Trojan horse?

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.



Source: http://www.webopedia.com/

15 June 2011

Discrete Mathematics - Unconscious Information Transfer


On the top, you can see 4 cards labelled ABCD. Now, pick a whole number ranging from 0-15.

Got it?  Yes.
Is it on card A? Yes.
Is it on card B? No.
Is it on card C? No.
Is it on card D? Yes.

The number you picked is 9.


Now, look back at the cards, try to figure out how I found out your number.

Figured it out yet?
No?

This is how it works:
1. Player picks one number between 0-15.
2. The number is on card A.
3. The number is not on card B.
4. The number is not on card C.
5. The number is on card D.

Okay, now that I have written all the clues I have, how can those clues help??

Clue number 1 : The number is between 0-15 (16 possibilities).
Clue number 2 : The number is on card A (8 possibilities left, since there are only 8 numbers on card A. Zero is also eliminated since it's not on card A).
Clue number 3 : The number is not on card B (Eliminate all numbers on card B[4,5,6,7,12,13,14,15]).
Clue number 4 : The number is not on card C (Eliminate all numbers on card C[2,3,6,7,10,11,14,15]).
Numbers Eliminated : 0,2,3,4,5,6,7,10,11,12,13,14,15
Numbers Left : 1, 8, 9
Clue number 5 : The  number is on card D.

Conclusion : Find the number (from the "numbers left" list) that is on both card A and card D.

It's 9. That's how it actually works.

So, what is the relation between this game and computer security?
As you can see, from 4 simple yes/no answers, we can get so much information, enough to guess(or in the victim's mind, "PREDICT") his number.

Therefore, you should think twice before answering any questions on the internet or elsewhere. It may lead to something harmful or dangerous, such as identity theft.


Note:
There is another method that involves memorizing answers to predict/guess player's number quickly, as soon as he/she gives us his/her fourth answer. However, I will not include this here, since this post mainly focuses on Computer Security, not algorithms.


Thank you for reading.
Cyber Frost

07 June 2011

E-Books Download Links Added

I have added some programming e-book links for you to download. please go to the download page for more details.


Regards,
Cyber Frost

21 April 2011

An Adobe Flash CS5-Based Advertisement


After a few days learning Adobe Flash, I created this simple advertisement.







Why do we need Flash-based ads?

First of all, flash-based ads are likely to be moving, thus making it more attractive.
Secondly, you can embed it anywhere you want: on your blog, your friend's site, etc.
Last but not least, SWF(ShockWave Flash) videos are also quickly-loaded. Therefore, users won't have to wait long for your sites to load the video ads.

Adding an ad like this to your website will surely increase the site's traffic by bringing in more visitors, making your site rank better in search engines like Google.

If you are interested in having one, simply drop a comment below or send an email to me.

Cyber Frost


20 April 2011

Disk Defragmentation - Why and How?

Computer memory contains files. These files may be in the form of PDF, Word Document, Power Point Presentation, Application, and many others. As time flows, a user will add more files as well as delete some files. Adding and deleting files will cause the magnetic field in the hard disk to be unorganized. This is called fragmentation.

Fragmentation is a state where a file is broken into pieces, thus making it harder(slower) to be accessed.

Alright, let's assume that you are feeling that your files are in this state. What should you do to settle this?

The answer is by doing defragmentation.
Disk Defragmentation, as its name said, is done to rearrange parts of broken files so that the files will be better-organized, enabling users to access the files more quickly.

In Windows Operating System (XP or higher versions), you can easily defrag your hard disks by using the built-in Disk Defragmenter utility.

Please note that I am using Windows Vista Ultimate, the steps may vary from other versions.

There are three methods:

First Method
  1. Click Start>Accessories>System Tools>Disk Defragmenter
  2. A window like this will be brought up:
  3.   
  4.  Click the "Defragment now" button to proceed.
  5. Wait until the process completes. It may take minutes to hours, please be patient. It's worth waiting because after the defragmentation your files will be more organized and easier to access.

Second Method
  1. Click Start>Run
  2. Type in "dfrgui.exe" (without quotes)
  3. Click the "Defragment now" button.
  4. Wait for the process to complete.

    Third Method
    1. Click Start>Run
    2. Type in "cmd" (without quotes)
    3. Type in "defrag -c"   (without quotes) and press Enter.
    4. Wait for the defragmentation to finish.


    You should defragment your computer at least every 4-6 months to keep your computer in good state.


    Thank you for reading. Hope this helps.
    Cyber Frost

      19 April 2011

      Color Changing Text Animation with Flash

      Here's my second animation. It changes the color of the text as it moves.




      More will be posted. In the meanwhile, enjoy!

      Cyber Frost

      18 April 2011

      My First Flash Animation

      I'm currently learning Adobe Flash CS5 Professional now. Here is my first flash text animation:










      It's still a simple one. Well, not bad for a first try anyway.

      I will be posting more to inspire you all.


      Cyber Frost

      17 April 2011

      Why Would One Become a Programmer?

      A computer programmer is an extremely interesting job to do, especially if you like to learn new things and expand your knowledge over many field of studies in a fun way.

      Programmers will learn many things as they create sellable programs or source codes.

      Let me explain to you using an example:
      A programmer is offered a project in making an accounting program which will help in making reports, calculating annual income, etc.
      In order to successfully build this program, he will need to learn:
      -Programming Languages(C, C++, HTML, VB.NET, Java, etc.)
      -Accounting Basics
      -Program Design Techniques
      -Languages, in which the User Interface will be written.

      So, besides earning money from the project, he will get some new experience with his programming skills, know the basics of accounting, have a better design skill as he creates more softwares, and improve himself in language usage.

      See? There are tons of benefits to work as a programmer.

      Some other advantages of being a programmer are:

      -Easy Money
      It is the era of computerization. Every company will soon use softwares  + IT Staffs instead of accountants, shopkeepers, architects, etc.
      You must take an advantage of this, begin learning how to do programming now.

      -Not Place-Dependent
      A programmer can do his project anywhere with his laptop and a charger(perhaps with a modem, too.)
      He doesn't have to stay in the office sitting for no reason. He can enjoy a cup of coffee in a mall while thinking about his projects.

      Despite the benefits offered, there are of course some drawbacks, too, which are:

      -Finding Projects
      Projects don't come to you, you must search for them. You can do so by advertising on the internet, telling your friends about your products in social networking services such as Facebook, Twitter, etc., or simply tell your mates in a daily conversation.

      -Time Consuming
      Programming is time-consuming, especially for newbies. Therefore, prepare to lose some hours of sleep. You can repay those lost hours later when you have free time. Exercise when you have time to keep yourself fit. You don't want to get sick, because projects don't wait.



      It's really beneficial to have computer skills in this era of computerization, everything is in process of being computerized, sooner or later employers will require you to have computer skills in order to work in his/her company. The best time to start is now.
      I can guarantee you, you will not regret excelling in many fields of study and earning much money making some creative applications.


      Thank you for reading.
      Cyber Frost

      08 April 2011

      Downloads Available

      The download page is now available.
      It contains home-made programs and scripts which will be explained further in my blog.

      Click here to go to the Download page,

      Feel free to download the programs and scripts. They are virus-free.

      Cyber Frost

      05 April 2011

      QR Code Implementation

      A QR code (short for Quick Response) is a specific matrix barcode (or two-dimensional code), readable by dedicated QR barcode readers and camera phones. The code consists of black modules arranged in a square pattern on a white background. The information encoded can be text, URL or other data. - Wikipedia.org

      In simple words, a QR Code is a 2D Barcode used to navigate users to a URL, to show some text, to send an SMS, and to add a phone number to a contact.

      QR Codes can only be interpreted or read by using a QR-Code Reader.
      For BlackBerry Smartphones, you can download ScanLife.
      Here are some other softwares for other types of phones.
      For phone platforms other than those listed above, I haven't done any research, so please make a search on Google if you are interested.

      Here is an example of a QR Code to navigate to my blog, simply scan it with a barcode reader and you will be automatically redirected to my blog.



      Another code to redirect user to this post:




      As this trick is more fun and creative to use in promoting your website or blog URL, this will likely increase the hits on your websites. Therefore, I suggest you to generate a QR Code of your web URL and post it to social networking sites, share it on forums, and put it in your blog/website.

      A website I recommend in generating QR Codes is : http://qrcode.kaywa.com/

      Try implementing this trick and give me some feedbacks.

      P.S.: Please kindly copy the 2D Barcode above to your site to help me promote my blog.


      Thanks for reading.
      Cyber Frost

      03 April 2011

      Finding a Website's DNS Address

      What is a DNS Address? DNS (Domain Name Service) Address is a unique IP-like numbers which represents a website.

      Although it is unique, some websites may share the same DNS Address.

      Alright, without wasting more time, let's move on to the steps:
      • Open cmd (Command Prompt)
      • Type in "ping www.website.com" (without quotes)
      Note: www.website.com is meant to be replaced with the web address you wish to find.
      For example: ping www.google.com
      • Press Enter
      It will return something like this:










      Click to enlarge picture

      Please notice the 74.124.224.51. That is the DNS Address of Google.com.

      You can apply this trick to any other website you wish to find the DNS Address of.
      Simply change the www.website.com to the address of the website.


      Thanks for viewing this post.

      Cyber Frost

      Phishing - Definition and Prevention

      What is Phishing? Well, phishing can be translated into what it is read. Fishing. Yes. Exactly.
      Why??
      Phishing is an act of stealing usernames, passwords, and other types of personal information by using any method such as social engineering, web forgery, and many other hacking techniques.

      One of these tricks, messing with links, traps unaware users that never looks into the url address bar of their browser while browsing. So, the first prevention trick would be : "Looking to your address bar whenever you browse a page."

      Looking to your address bar whenever you browse a page

      For instance, if your are going to http://www.facebook.com/, make sure that the browser address bar shows exactly the same as what you expect, which is http://www.facebook.com/ and not http://www.facebook.net/ or http://www.facebok.com/.

      The easy way to prevent mistyping:
      Bookmark the page by pressing Ctrl+D
      Whenever you want to access the page, you can select it from the bookmark list to prevent mistyping which could lead to serious problems.

      Now, having the first prevention method, you might ask: Is that all?

      No way!

      Let's see the hacker's second method:

      DNS Redirection and Link Faking

      DNS redirection, done by editing Windows HOSTS File, is quite dangerous too. Although you have bookmarked the page, it will still redirect you to a page with a specified DNS.

      For example, you have bookmarked http://www.facebook.com/. This request will first read through the DNS list inside the Windows HOSTS File. Let's assume the content looks like this:

      74.125.224.50 www.facebook.com

      You will be redirected to http://www.google.com/ when you try to access your bookmarked Facebook Site.

      See? Hackers are creative.

      Cleaning the content of Windows HOSTS File

      The Windows HOSTS File is commonly located in C:\Windows\system32\drivers\etc\hosts
      To clean its content, simply follow this steps:

      1. Open cmd
      2. Type in "echo clean>C:\Windows\system32\drivers\etc\hosts" (without quotes)
      3. Press Enter
      Now, you can browse your pages safely. But, I recommend  restarting your computer first before you start browsing again, because the changes might not have taken effect until after a restart is done.

      Link Faking
      Link Faking is a simple yet tricky way to trap users.
      Here is an example: http://www.google.com/

      Clicking that link, you expect the browser to navigate to Google. However, it will bring you to Facebook. Imagine if the redirected website has a look exactly the same as your destination website, you will end up having your personal information stolen.
      My advice would be : "Always be aware of your browser address bar."


      DNS Spoofing
      Another method, which is the last I will tell you about, is the "DNS Spoofing". This trick can be done using some programs like Cain and Abel.

      It will redirect you to a forged website, which is already prepared by a hacker, without changing your address bar. You won't notice that you are on a fake website.
      This trick can't be recognized by normal users. So, simply update your Antivirus program to its latest patch.

      There are more ways that I haven't mentioned, hackers are always one step ahead, so be careful and always get updated with the latest information available.

      Thanks for reading.

      Cyber Frost

      02 April 2011

      Bloggers Needed - Category : Computing Technology

      I need blogger volunteers. Requirements are :
      -Having good written English.
      -Owns a blog(or a website).
      -having knowledge about computers and technology.

      Submit your website or blog address to the comment box below for me to review before I add you as one of my my blog authors.


      Regards,
      Cyber Frost

      31 March 2011

      Blocking CMD (Command Prompt)

      The first question that comes to your mind might be : "Why would someone block the Command Prompt?"
      There are some reasons to do this and one of the reasons is to prevent unwanted users from messing with your policies and having elevated privileges.

      This trick is used by Internet Cafe Admins and IT Managers in many companies.

      How to :

      There are two simplest methods that can be used for this purpose. 

      First Method :
      • Open notepad.exe
      • Type in the code below:
            dim reg
         set reg = CreateObject("Wscript.Shell")
         reg.RegWrite "HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD", "1", "REG_DWORD"

      • Save it as DisableCMD.vbs
      • Run it by double-clicking on the file.
       Second Method :
      • Open cmd.exe
      • type in : reg add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /d 1 /t REG_DWORD
      • Press enter and close the CMD window. 

      Now, having disabled the CMD, what if you wanted to re-enable it for some reason, such as when it is disabled by a virus?

      We only have one option left (since I taught you only two methods and the second won't work because the CMD itself is blocked already), wchich is to use VBScript.

      The steps would be :
      • Open notepad.exe 
      • Type in the code below:
            dim reg
         set reg = CreateObject("Wscript.Shell")
         reg.RegWrite "HKCU\Software\Policies\Microsoft\Windows\System\DisableCMD", "0", "REG_DWORD"

      • Save as EnableCMD.vbs
      • Double-click on the icon to run the script

      Actually there are more methods in doing this(writing to the registry), such as :
      -Using BAT Files
      -Using CMD Files
      -Using REG Files
      -Directly editing the values from regedit.exe(Windows Registry Editor)
      -etc.




      Finally, thank you for reading this post. May this be useful.


      Cyber Frost

      30 March 2011

      Getting your Computer's Machine Address (MAC)

      Type this code in the notepad, then save as MAC.bat :

      @Echo Off
      Echo Checking MAC Address...
      getmac


      It should look like this :


      Notepad - MAC


      When saved as MAC.bat and run, it should look like this :

      MAC.bat


      P.S. : If you don't know which one the MAC Address is, it is 00-21-27-F6-83-57 in the picture...

      Cyber Frost

      29 March 2011

      MiniLyrics, Adding Lyrics to your Windows Media Player

      Have you ever wanted to listen to a new song without having to search the lyrics from the internet?
      Here it is, MyniLyrics, an application that helps you download the lyrics, displaying it while you are listening to the song.

      Click here to download MiniLyrics 7.0.676.

      Note: You have to be connected to the internet to view the lyrics.

      Thanks for reading, drop comments below if you have any questions.
      Cyber Frost

      Deep Freeze Vs. Antiviruses

      I believe we all know these names below:
      • Kaspersky Antivirus
      • Norton Antivirus
      • AVG
      • ESET NOD32 Antivirus
      • Avira Antivirus
      • and many more...
      And, maybe some of you have known the program Deep Freeze, a utility that can restore your computer to its former state(the date when you first installed Deep Freeze) when the computer is restarted.

      In my opinion, this capability of Deep Freeze to restore a computer's state is more useful than antiviruses capability of removing virus, which they rarely succeed to do because they are blocked by the virus itself.

      Therefore I suggest you to download and install the latest version of Deep Freeze in your computer. It is user-friendly, versatile, and easy-to-use. You can download the latest free version of Deep Freeze here.

      Note: Please notice that the Free Version of the program protects only Drive C:, which is the most important drive in your computer, containing system files needed to boot your computer up. Drives other than C: will not be protected, please take note on this.

      When you accidentally deleted an important file, simply restart and the file will be restored. However you should also take note that any changes you make in a Frozen state will not take effect. If you want to install any new programs, you should set the state to Thawed and restart your computer before you can install it. The same trick is used when you want to save/download a file, document, etc.


      Hope this helps. Thank you for reading.

      Cyber Frost

      Javascript, Client-Side Website Editing

      There's a javascript code that can be used to edit webpages, not by altering the HTML source, but by editing it visually right from your browser screen.


      Here's the code:

      javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

      Simply copy it to the address bar of your browser and press enter.

      When you have finished editing the webpage, you can capture it by using these methods:
         I. The Print Screen Method
            Using this method, here are the steps:
      1. Press the Print Screen key on your keyboard.
      2. Click Start>Run and type in mspaint.
      3. Press Enter.
      4. Press Ctrl+V(Paste).
      5. Save the picture.
         II. Using Programs to Capture
             There are several programs that you can use to do this job, which are:
      1. Snipping Tool, included in Windows itself(Vista or higher).
      2. Snippy , can be downloaded here.
      3. and many others, simply do a search on Google.

      After you finished capturing all the pictures you need, simply refresh the page to exit editing mode.


      Well, thank you for reading. Enjoy your day.

      Cyber Frost

      28 March 2011

      My First Post

      Now, here is my first post.


      I haven't had time to post anything yet, but soon I will. So, be patient.

      I will inform you when I update my blog. Thanks for reading.

      Search