Monday, December 24, 2007

Video Avatars

Ever wonder how people make Avatars out of Video? Here's how.

Video Avatars

1. Open PowerDVD:

2. Open a movie or Video clip:

3. Go to the beginning of the part u want as avatar & click on pause

4. Make a picture of it:

5. Press 2 steps forward & then make another pic, do this until u got the whole part:

6. Go to imageready 7 & then select "file", "import" & then "folder as frames..." & then u select the folder wit your pics made wit powerDVD:

Sunday, December 23, 2007

Remove Funny UST Scandal.avi.exe

Details:
1) This will block your Task Manager, Registry Editor and Command Prompt.
2) It hacks in your Yahoo Messenger and sends stupid and senseless messages to them and even a copy of itself.3) It will log your all key strokes and send them to an unknown email address through IM.
4) It slows down your system badly and reinstalling the OS will do no good.
5) It will disable the search and viewing of hidden files.

It’s built using AutoIt V3 virus programming software.--(source= some blog)


Windows XP:
This virus was made mainly to infect XP and Windows NT systems. In XP and NT systems, it makes the following files:
a) Killer.exe (4084 kb) in c:\windows\
b) lsass.exe (3920kb) in c:\documents and settings\all users\start menu\programs\startup
c) xmss.exe (4088kb) in all partitioned drives and in c:\windows
d) autorun.inf (1kb) in all partitioned drives with a script.

e) Funny UST Scandal.avi.exe in all partitions and Funny UST Scandal.exe in c:\Windows.


This Virus makes the following registry entries:
a) HKLM\Software\Microsoft\WindowNT\CurrentVersion\Wi nlogon
shell(killer.exe or xmss.exe)
b) HKCU\Software\Microsoft\windows\Currentversion\Run

Runonce(c:\windows\xmss.exe)

If the virus has completely installed itself, then you can find all these files in your system.

To remove this virus:
a) In order to removes the files, you’ll first have to stop the execution of this virus. To do so, download this file and run it.
b) Now open cmd.exe and go the above mentioned locations and unhide the files by typing: attrib –h –s Funny UST Scandal.exe for C:\windows and so on for all the other files in different locations. You might get an error while unhiding Funny UST Scandal.avi.exe which is placed in all partitions. If you get that error, just leave that file.
c) After unhiding all these files, delete them from your hard disk.
d) Download REPLACER and open it.
e) In the REPLACER type: c:\Funny UST Scandal.avi.exe and press enter. It will now ask you for another file. Create a text file named a.txt in C:\ and then type: c:\ a.txt and press enter. Press Y and press enter. Go to C: drive and there you’ll find 3 files named Funny UST Scandal.backup, Funny UST Scandal.exe and a Temp file. Delete them.
f) Repeat Step e) for all you partitions.


Windows Vista:
Files included:
a) xmss.exe (4088kb) in all partitioned drives and in c:\windows
b) autorun.inf (1kb) in all partitioned drives with a script.

c) Funny UST Scandal.avi.exe in all partitions and Funny UST Scandal.exe in c:\Windows.

Registry Entries:
a) HKLM\Software\Microsoft\WindowNT\CurrentVersion\Wi nlogon
shell(killer.exe or xmss.exe)
b) HKCU\Software\Microsoft\windows\Currentversion\Run

Runonce(c:\windows\xmss.exe)
The second key might no be present.

Removing the Virus:

To remove this virus:
a) In order to removes the files, you’ll first have to stop the execution of this virus. To do so, download this file and run it.
b) Now open cmd.exe and go the above mentioned locations and unhide the files by typing: attrib –h –s Funny UST Scandal.exe for C:\windows and so on for all the other files in different locations. You might get an error while unhiding Funny UST Scandal.avi.exe which is placed in all partitions. If you get that error, just leave that file.
c) After unhiding all these files, delete them from your hard disk.
d) Download REPLACER and open it.
e) In the REPLACER type: c:\Funny UST Scandal.avi.exe and press enter. It will now ask you for another file. Create a text file named a.txt in C:\ and then type: c:\ a.txt and press enter. Press Y and press enter. Go to C: drive and there you’ll find 3 files named Funny UST Scandal.backup, Funny UST Scandal.exe and a Temp file. Delete them.
f) Repeat Step e) for all you partitions.

Hide Files in Jpeg images

We will hide a text file called "code.txt" in an image called "nirvana.jpg".You need to have Winrar for this.So here goes....

1)Move both code.txt and nirvana.jpg to a new folder(say C:\New)

2)Add code.txt to a new rar archive called code.rar in the same folder,(C:\New in our example).

3)Now go to Start -> Run..., type cmd and press Enter.

4)Go to the folder where your files are located,(C:\New in our example).by using cd.. command.(use cd.. command to go one level up).



5)Now type "copy /b nirvana.jpg + code.rar secret.jpg"(without quotes) where secret.jpg is the file name u want to give to image that contains both nirvana.jpg and code.txt.

Congrats!!You are almost done with it now .

6)If you open secret.jpg,you will see the original image(nirvana.jpg).Open secret.jpg with Winrar and you will see your hidden file(code.txt)

Unite Windows and Linux With a Single Mouse Click!

Step 1: Install necessary software:

· VirtualBox

Here's how to install VirtualBox on Ubuntu OS:

1. Click the above link and download VirtualBox for your architecture (i386 or amd64). Please notice that on the download page for VirtualBox, you will find packages for many other Linux distributions, in case you don't use Ubuntu.

2. Good, now that the download is finished, double click the .deb file and install the software.

Review image

3. You must execute the following command in a terminal window, in order to use VirtualBox:

sudo adduser yourusername vboxusers

4. Log out of your current session and the log back in.

That's it!

Step 2: Prepare VirtualBox to run Windows

The VirtualBox application will be installed in the System Tools category, so open it from Applications -> System Tools -> Innotek VirtualBox if you are a GNOME user, or from KMenu -> System -> More applications -> Innotek VirtualBox if you are a KDE user.

Review image

Create the virtual machine

Now, you need to:

Review imageReview imageReview image

Review imageReview imageReview image

Review imageReview image

1. Click the "New" button to create a new virtual machine.
2. Select "Windows XP" as the OS Type and write a name for your virtual machine.
3. Click Next and drag the memory slider to 256 MB. If you have more than 1GB RAM, you can rise the slider to 512 MB.
4. Click Next and hit the 'New' button to create a new hard drive:

4a. Click Next
4b. Select the 'Fixed-size image' option and click Next
4c. Decrease the initial value to 6 GB by dragging the slider in this screen. If you have a bigger hard drive (250 GB or 500 GB) then you can leave the slider to 10 GB (default option). Click Next.
4d. Click Finish.

5. You can see now the newly created hard drive. Just click Next and then Finish.

The virtual machine is now created and all you have to do is to make some basic settings to it before you start installing Windows.

Configure the virtual machine

Hit the General link and be sure that you setup the virtual machine exactly like I did:

Review imageReview imageReview image

1. On the 'General' section drag the "Video Memory Size" slider to 64.
2. On the 'CD/DVD-ROM' section check the "Mount CD/DVD Drive".
3. On the 'Audio' section check the "Enable Audio" box and then select 'OSS Audio Driver' from the drop-down box.
4. On the 'Remote Display' section check the "Enable VRDP Server" box.

That's all! Now insert the Windows XP CD in your optical drive and power on the virtual machine. The CD will be detected and the Windows installation will start. I guess I don't have to explain you how to install Windows.

Step 3: Configure the virtual Windows

When the Windows installation is finished and you are able to see the desktop, go to Devices -> Install Guest Additions (in the VirtualBox window) and wait for an installer window to appear on your desktop. Follow the installation steps and reboot the virtual machine.

Review imageReview imageReview image

Warning: You must have a working Internet connection before you install these Guest Additions!

Unite Windows and Ubuntu into a single desktop

This is the final step and the moment everyone has been waiting for! All you have to do now is to deactivate your desktop effects (if you have) and go to Machine - Seamless Mode (in the VirtualBox window) and unite Windows with Ubuntu (or any distro you may have) into a single desktop.

Review imageReview image

Tip: The Windows taskbar will appear over your Linux one. Therefore, you must right click on it and unlock it, so you can move it to the upper part of the desktop.

Below you can see some nice screenshots of my Windows/Ubuntu desktop, where I run Internet Explorer 7, Notepad, and any other Windows application that I found useful. Enjoy!

Review image
Review image
Review image
Review image

IMPORTANT: Remember that every time you restart your computer, the virtual machine that runs in background will close, so you'll have to open VirtualBox when you enter your Linux session and start the Windows virtual machine. The best part is that it will open automatically in seamless mode!

Disable Access to USB Mass Storage Drive

This hack will disable access to the usb flash drive
also known as usb mas storage drive ( also usb hard
disks but not sure as I don't have one).

Goto start > run > and type in regedit and press enter.
This will open registry editor window. Now go to the
following key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\USBSTOR

Right click on the key and select export and save a backup copy in case
anything goes wrong. Now on the right pan of the regedit window double
click on the value called Start & set it value to 4 & click OK.

When you need to use your USB mass storage drive just change the value of
Start to 3.

If you're too lazy just copy & paste these codes into a notepad
file and save it with a .reg extension.

code for Disable access to the usb mass storage drive :

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR]
"Start"=dword:00000004


code for enable access to the usb mass storage drive :

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR]
"Start"=dword:00000003

Playing Sony playstation 2 games on your computer

What is it ??

PCSX2 is a PlayStation 2 emulator for Windows and Linux, started by the same team that brought you PCSX (a Sony PlayStation 1 emulator).
The PCSX2 project attempts to allow PS2 code to be executed on your computer, thus meaning you can put a PS2 DVD or CD into your computers drive, and boot it up!

Download


After please read the guide for configuring the software here

http://www.pcsx2.net/guide.php

Saturday, December 22, 2007

A.R.Murugadoss & Aamir Khan break Indian record

A.R.Murugadoss and Aamir Khan have managed to pull off a national level record for the highest distribution rights paid for a single movie yet! Yes, you heard it right: their Hindi Ghajini has garnered a whooping 90 crores in distribution price for its producers Madhu Verma and Allu Arivind.

Aamir Khan
The Indian Film Company (IFC) has paid 53 crores to the producers of the movie for the domestic distribution rights. IFC had earlier distributed Jab We Met and Welcome, both of which have been profitable ventures. Overseas, satellite, online and home video rights collected another 40 crores.

This is quite a remarkable achievement considering the fact that not a single official still has been released about the movie yet.

The movie is obviously heavy weight with Aamir fresh off his Taare Zameen Par success, A.R.Rahman as the music director (the inside story is that the director has composed some mind blowing music for the movie), Ravi K Chandran in charge of camera, and Murugadoss, one of the most commercially successful directors of the south at the helm. Asin plays the lead lady of Aamir, supported by Jiah Khan

Ghajini has managed to break the record set by Om Shanthi Om, which had collected 73 crores for its distribution rights.

Now for the really interesting side of all this: Aamir is not just looking to take away Shahrukh's record on the finance-side, but also on the physical side. He is gearing up to flaunt a six pack ala Shahrukh Khan. The actor is on a strict exercise regimen, building up muscles and pumping some iron.

Protect yourself against keyloggers

Besides protecting your System additional measures that can be taken
are:
Monitoring what programs are running on your computer
Monitor your network whenever an application attempts to make a
network connection.
Use an automatic form filler program that prevent keylogging since
they're not using the keyboard.

There are commercially available anti-keyloggers, such as
PrivacyKeyboard:
http://www.anti-keylogger.com.
It uses the methods of heuristic analysis and has no signature base.
PrivacyKeyboard's features:
* No signature base;
* Protection against windows text capturing;
* Protection against keystroke logging;
* Protection against clipboard capturing;
* Protection against active window screenshoting;
* Protection against desktop screenshoting;
* Protection against attacks of spy programs;
* Protection against hardware keyloggers;
* Full UNICODE support;
* The ability to work at the background, transparently for the
user
* The ability to disable keyloggers instantly

Problem is you'll have to part with $89.95 ...

but if you're looking for a free alternative try:
- Spybot Search & Destroy, a freeware tool that does a pretty decent
job at detecting all kinds of spyware.
Latest update protects against the following Keyloggers:
+ Perfect Keylogger
+ Ardamax
+ Elite Keylogger

http://www.safer-networking.org/

Windows Defender, a free program that helps protect your computer
against pop-ups, slow performance, and security threats caused by
spyware: http://www.microsoft.com/athome/secu...e/default.mspx

The Sysinternals web site hosts several utilities to help you manage,
troubleshoot and diagnose Windows systems and applications.
Utilities for looking under the hood to see what processes are doing
and the resources they are consuming:
http://www.microsoft.com/technet/sys...s/default.mspx

In this article:
http://www.lazybit.com/index.php/a/2...ger_protection
Alex provides some free and valuable advice about keylogging
protection such as using the on-screen keyboard available in W2000 and
XP that can be launched by executing "osk" or the technique of mouse
highlighting and overwriting.

Or you can also download Click-N-Type virtual keyboard free from:
http://www.lakefolks.org/cnt/

Also worth reading is Wikipedia's article on Keystroke logging:
http://en.wikipedia.org/wiki/Keystroke_logging

http://magikomputer.blogspot.com/200...rotection.html

Friday, December 21, 2007

Windows Processes That May Be Dangerous

Many times viruses or trojan horse programs may spawn themselves as the names of
legitimate programs. The following is alist of processes that are consistantly spoofed.
These processes may exist (and many do) legitamatly on your pc. Just beware if such
processes exist and you have never installed the application.

Suspect Windows Processes:

adaware.exe
alevir.exe
arr.exe
ascv.exe
backWeb.exe bargains.exe
blss.exe
bootconf.exe
bpc.exe
brasil.exe
bundle.exe
bvt.exe
cfd.exe
cmd32.exe
cmesys.exe
datemanager.exe
dcomx.exe
divx.exe
dllreg.exe
dpps2.exe
dssagent.exe
emsw.exe
explore.exe
fsg_4104.exe
gator.exe
gmt.exe
hbinst.exe
hbsrv.exe
hxdl.exe
hxiul.exe
iedll.exe
iedriver.exe
iexplorer.exe
image.dll
infus.exe
infwin.exe
intdel.exe
isass.exe
istsvc.exe
jdbgmgr.exe
kazza.exe
keenvalue.exe
kernel32.exe
launcher.exe
loader.exe
mapisvc32.exe
md.exe

mfin32.exe
mmod.exe
mostat.exe
msapp.exe
msbb.exe
msblast.exe
mscache.exe
msccn32.exe
mscman.exe
msdm.exe
msiexec16.exe
mslagent.exe
mslaugh.exe
msmgt.exe
msmsgri32.exe
msrexe.exe
mssys.exe
msvxd.exe
netd32.exe
nssys32.exe
nstask32.exe
nsupdate.exe
onsrvr.exe
optimize.exe
patch.exe

pgmonitr.exe
powerscan.exe
prizesurfer.exe
prmt.exe
prmvr.exe
ray.exe
rb32.exe
rcsync.exe
run32dll.exe
rundll.exe
rundll16.exe
ruxdll32.exe
sahagent.exe
save.exe
savenow.exe
sc.exe
scam32.exe
scrsvr.exe
scvhost.exe
service.exe
showbehind.exe
skynetave.exe
soap.exe
spoler.exe
srng.exe
start.exe
stcloader.exe
support.exe
svc.exe
svchosts.exe
svshost.exe
system.exe
system32.exe
teekids.exe
trickler.exe
tsadbot.exe
tvmd.exe
tvtmd.exe
webdav.exe
win32.exe
win32us.exe
winactive.exe
win-bugsfix.exe
windows.exe
wininetd.exe
wininit.exe
winlogin.exe
winmain.exe
winnet.exe
winppr32.exe
winservn.exe
winssk32.exe
winstart.exe
winstart001.exe
wintsk32.exe
winupdate.exe
wnad.exe
wuamgrd.exe
wupdt.exe

Thursday, December 20, 2007

Get an anonymous call using Google search

Of all the craziest things Google offers,I believe this is the worst(or funniest).I was browsing for some viruses to download(laughs maliciously) and found this crazy thing in Google.

1.Search for "Virus Download" or "movie Download" (or just search for anything)without the quotes in Google.

2.On the Right Hand side,you'll see some searches with a Telephone icon in green colour.CLick on any one of the icons,which represents a particular company.

3.A text box appears where you can enter a mobile number.Enter one(with the international code-its +91 for India).

4.The company in question calls that number and supposedly talks about the company's business(puts mokkai,simply).Actually this didn't happen to me whenI tried it out on my mobile.I got a call from a weird number and it got cut.

Worth a laugh,huh guys?


PS.An apology for all the numbers I tested it on ;)

The Dark Side of pLasma

Welcome,welcome and welcome to pLasma's pLayground-the place where you can find anything related to hackin' and crackin'.I thought I'd share my views and little bit of knowledge on hacking through this blog.So,who's gonna stop me? :)
You'll find all kinds of software that would make your antivirus scream,your firewall beg for mercy and your OS crash and bow down to death.Lo,you have been warned.
I'll be providing some tips and tricks that make you look like a hacker,though it wouldn't take you near to the true essence of the word.And oh,I'll be linking up some software as well,that would allow you to remotely control a system without acquiring proper acquiescence(in plain bullshit-hacking it and screwing it).Stay tuned!

And oh,I almost forgot another formality.

DISCLAIMER:The content provided on this site is for educational purposes only and is not meant for intentionally harming anyone.Use of any of the software/tweaks/methods without proper understanding can result in disastrous results for which I am in no way
responsible.Use at your own risk.
(Does anyone read this bullshit?)