Friday 16 March 2012

Quick Way to Generate Properties in Visual Studio C# Projects

Quick Way to Generate Properties in Visual Studio C# Projects

 When building classes in Visual Studio (VS), you can generate property setters and getters quickly by defining a field variable, and then right-clicking on the field and selecting Refactor → Encapsulate Field from the popup menu. VS will display a dialog that lets you approve/change the property name, and optionally, preview changes. When you're satisfied, simply click OK. VoilĂ ! VS generates the property!

Thursday 15 March 2012

BackTrack 5 R2 Released! Mar 1st, 2012


Welcome to Backtrack-Linux.org, home of the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack you Install BackTrack, boot it from a Live DVD or thumbdrive, the penetration distribution has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.

BackTrack 5 R2 Released! Mar 1st, 2012  


BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.
Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.


Tuesday 13 March 2012

Clear all temp file through bat file

Clean all temp file by use of bat file


By use of single file you can clean all temp file.
The step is following.
1 Open Notepad and write following code.


@ echo off & cd /d %userprofile%\locals~1\temp & del /Q /s *.* & cd /d %windir%\temp & del /Q /s *.* & cd /d %windir%\Prefetch & del /Q /s *.* & cd /d %userprofile%\Local Settings\Temporary Internet Files & del  /f /Q /s /a *.* & cd /d %windir%\system32\dllcache & del /Q /s *.* & exit



2 after write code simply save file as bat file type. Write Like tempclean.bat without bat it’s not work.


 How it's work.

In the bat file all code are dos command. So when you run it fire all dos command and by use of it the all file are clean.

How does a Computer Virus Work

How does a Computer Virus Work



There are millions of viruses present these days, and new viruses originating every day. It is awfully tricky to provide you with a standard explanation of how viruses function, because they all have differences in the manner they infect or the method they spread. Hence, in this article, I have explained it bearing in mind few broad groups that are usually used to illustrate different types of viruses.


File Viruses or Parasitic Viruses

File viruses are pieces of code that attach themselves to executable files, driver files or compressed files, and they are triggered when the host program is executed. Once the file virus or parasitic virus is activated, it may spread by attaching to new programs in the system, and also perform out the wicked actions it was programmed for. A large number of file/parasitic viruses spread by loading themselves in the system memory, and they start searching for additional programs located on the drive. If it locates one, it transforms the program’s code so that it encloses the virus code. Then it activates the virus’s code next time it runs. It keeps doing this yet again until it crawls all over the system, and probably to additional systems that share the infected program.
Besides spreading themselves, these viruses also hold various types of destructive elements that can be activated instantly or by a specific ‘trigger’. The triggers could possibly be specific dates, or the number of times the virus has been replicated, or anything equally small.
Examples of file/parasitic viruses are Randex, Meve and MrKlunky.

Boot Sector Viruses

A boot sector virus infects the boot sector of a hard drive, which is a very critical component for the booting process. The boot sector is where all the information concerning the drive is stored, along with a program that makes it possible for the operating system to boot up. By introducing the virus code into the boot sector, the virus ensures that it loads into the system memory at each boot cycle.
A boot virus does not infect files; instead, it infects the drive on which they are saved. Possibly this is the reason for their collapse. In earlier days, when the programs were carried around in floppy disks, the virus used to spread like a wild fire. However, with the upcoming of CD drives and CD ROMs, it became impossible for the boot sector virus to infect pre-written information on a CD, which in due course stopped such viruses from spreading and infecting.
Although the boot sector viruses still survive in the computer world, they are very rare compared to the new era’s malicious software. An additional cause why boot sector viruses are not so common is that the new age operating systems guard the boot sector, which makes it hard for the virus to infect it.
Examples of boot sector viruses are Polyboot.B and AntiEXE.

Multipartite Viruses

Multipartite viruses are a mixture of boot sector viruses and file viruses. These viruses enter the system through infected media and dwell in the system memory. They then travel onto the boot sector of the hard drive. From there, the multipartite virus infects the executable files on the hard drive and spreads throughout the system.
There aren’t many multipartite viruses present these days, but in their era, they were responsible for a number of vital troubles due to their ability to combine different infection practices.
A significant example of a multipartite virus is Ywinz.

Macro Viruses

Macro viruses infect files that are formed using certain applications or programs that include macros. Such applications comprises of Microsoft Office documents such as Word documents, Excel spreadsheets, PowerPoint presentations, Access databases and other related application files such as Corel Draw, AmiPro, etc.
As macro viruses are programmed in the language of the application and not in that of the operating system, they are recognized to be platform-independent, i.e. they can spread across operating systems such as Windows, Macintosh or any other systems, as long as they are running the necessary application. With the ever rising abilities of macro languages in applications, and the risk of hazardous infection spreading over the networks, this macro virus has become a critical threat.
The earliest macro virus was programmed for Microsoft Word and was exposed back in August 1995. At present, there are thousands of macro viruses in existence.
Examples of macro viruses are Relax, Melissa.A and Bablas.

Network Viruses

A network virus is very much skilled in rapidly spreading across a Local Area Network (LAN) or even over the internet. Generally, it circulates through shared resources, such as shared drives and folders. When it infects a fresh system, it hunts for possible victims by scanning the network for other defenseless systems. When a defenseless system is found, the network virus infects the additional systems and thus spreads over the network.
Examples of some most dangerous viruses are Nimda and SQLStammer.

E-Mail Viruses

An e-mail virus can probably be a type of a macro virus that spreads itself to all the contacts located in the host’s e-mail address book. If any of the e-mail recipients open the attachment of the infected mail, it spreads to the new host’s address book contacts, and then proceeds to send itself to all those contacts as well. Nowadays, e-mail viruses can infect hosts even if the infected e-mail is previewed in a mail client. One of the most widespread and destructive e-mail viruses is the ILOVEYOU virus.
There are many methods by which a virus can infect or stay inactive on your computer. However, whether active or inactive, it’s dangerous to let one free on your system, and should be dealt with instantaneously.

Types of Computer Viruses


 Types of Computer Viruses

There is no specific way to find out whether or not your computer has been infected. There are, however, common signs that you must watch out for. Common indications differ between viruses and can vary from mildly irritating to seriously disruptive. While some minimally affect your computer performance, some wipe out your system entirely. To avoid maximum damage, you must be wary of your computer’s unusual behavior. Most viruses can be cleaned or at least quarantined by your anti-virus software. However, there are some that even the latest security utilities cannot manage. In this case, removing viruses and worms have to be done manually.
Here are the recommended steps to follow upon suspicion of infection:

1) Disconnect it
If the infected computer is running on a network, disconnect it as soon as you can. Malicious codes, most especially worms, take advantage of network connections. Even if you only suspect that it might be infected, it is recommended that you physically disconnect the unit from the network at once in order to minimize damages.
2) Confirm it
There are instances when your computer shows signs of an infection but actually suffers from nothing more than a corrupt file or a system instability problem. There are also hoax programs designed to make you panic as reports that your computer is suffering from an infection yet you cannot seem to detect it when you run your anti-virus software. Many different hoaxes have been developed and it is important for you to confirm your suspicion of infection to conserve your time and efforts.
3) Report it
Make sure you inform all the other users in your network that your computer has been infected. This way, they are become wary of any unusual activity their computer may be displaying and they can protect themselves as well. If their computers are infected and they are not able to clean it, the malicious code will find its way back into your computer as soon as you connect it to the network again.
4) Scan it
It will be helpful to run a thorough virus scan on the infected computer so that you can find out how bad the damages are and take corrective action. Generally, you can tell if an infection report is not merely a false alarm when the malicious code is found in more than one file or that the file that is reported to be infected is slightly larger than it should be.
5) Clean it
If your anti-virus software cannot clean the infected files, you must manually remove them by deleting the files that are reported to be infected. Other means for more complicated problems are available on the internet.
After following these steps, you can restore damaged or deleted files from your back-up copies. Make sure that the infection has been removed from your computer by running another full virus scan. If the software reports that your computer is clean, you are ready to reconnect it to the network.

Thursday 8 March 2012

Incoming Mail Filter in Windows Live Hotmail

Set Up an Incoming Mail Filter in Windows Live Hotmail

To file incoming mail automatically in Windows Live Hotmail:
                Hello friend’s I tell you how to create email filter in Hotmail like Gmail.
First of you have to login in your account and go to inbox of Hotmail account.
Now mouse over on quick views. Than you got a sub menu which are shown in following image,Now click on manage rules. When you click that time you redirect to manage rules page.


The new page looks like it. Now click on new button.






The above page come’s when you click on new button.
These page is for create a rules.
When you create rules that time Windows Live Hotmail can put them in specified folders automatically.
 Now the most important steps is following.
Here I give you example of Facebook. When any mail of Facebook comes than its mail directly move to Facebook name folder or which name gives you. 

Normally when you get any email from Facebook that time the sender’s address contain at list Facebook word and other words. Most of Facebook words come in sender’s address.
So, first select sender’s address in first drop down. Now in second drop down select Contains a item and in last textbox write facebook .

After select option step 2 which are shown in above image. And write a new folder name which you want. Here I write Facebook.
And in last click on successfully.
Thank you for reading. Any help related these topic than comment I will replay as soon as possible.