Do you want to play a trick on your friends? Our shocking but harmless Virus is the best choice for you! Here's what to do:
Step
1. Read and understand the warnings!
2.Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
3.Copy and Paste the Code of the "virus" into Notepad
4.Click File -> Save as
5.Decide for a location to save the fake-virus. You should chose a location where the user won't find the file, so saving it on the desktop would be a bad idea!
6.Change ".txt" to "All files" in the file type drop-down menu
7.Chose a harmless filename. Replace the ".txt" at the with ".bat"
8.Click on save and close Notepad.
Now, that we have our Virus saved, we should prepare a decoy:
Right click on the desktop and go over to "new" then click "short cut".
For the location of the short cut chose our Virus.
Click next
Give the shortcut a name that your victim will click on. ("Music for free", "My Documents", "Critical Windows-Update" "Get Free Cinema-Tickets" or "Internet Explorer")
Click on "Finish"
Right click on the shortcut you have just made and chose "properties". Now click on the "chose icon" button and scroll through the list of icons.
Decide for one of the icons that fits well to the name, chose it by clicking on it and hit OK twice.
Shock your Victim
Now it's time to sit back and enjoy the show!
You should really try not to laugh before the computer shuts down! (Think of sth. said)
As the computer goes out, you should check whether your friend is okay and then you may start laughing and start the computer again.
Abort Shutdown-Countdown
Sometimes it might be necessary to stop the countdown before the computer shuts down. Here's how to:
Open the start menu.
Click Run
Type "shutdown.exe -a" and press enter/return.
WATCH vedio
Create Virus


Change a Computer Password Using Command Prompt


Ever thought of becoming an actual "hacker"? This article shows how to change a computer password and do other things using a command prompt. A command prompt is a command using the special built-in program that comes with every computer which allows you to do almost anything on a computer.
STEP
1. Open Command Prompt. If you don't know how, open the Start menu, go to Programs (or on Windows 2000 and up, all programs), go to Accessories, then you'll see Command Prompt, click it.
2. You'll see a black screen pop up.
3. Type in: "Net User"
4. It will then show you a detailed little chart of all the User Accounts on the computer.
5. Choose which account you want to hack.
6. Say it says the user accounts are: Owner, Administrator, John, Alice, Christopher, and Guest.
7. You choose Alice (Say you wanted to annoy your wife or girlfriend, I told you this would be a useful guide ;) ).
8. Now type: "Net User Alice", it'll give you A LOT of information about the account. This step isn't necessary, but it gives you information on other things you can do to the account, such as set it as innactive and delete it.
9. Type in: "Net User Alice *" It'll tell you to enter a password, then again to confirm it. This will either change the password or make a new one. This might not always work though.
10. Good Job! You've actually hacked an account! Now if Alice says anything, good luck with that, that's in the article "How to Ignore an Annoying Wife or Girlfriend"... if it exists.
TIPS
The heart-breaking truth is, you can only do this sort of thing on an Administrator's account.
To set an account innactive or active, here's the 2 ways:
Innactive: Type in: "Net User [username] set /INNACTIVE"
Active: Type in: "Net User [username] set /ACTIVE"
If you forget the Administrator's password on a Windows XP and below computer, go to safe mode using F5 (F8 on every other computer except XP), go to Safe Mode with Command Prompt, go to the secret Administrator account that only shows up in Safe Mode, and do the same thing.
On a Windows Vista computer, the secret Administrator's account is not in Safe Mode, you have to set it as active by typing in: "Net User Administrator set /ACTIVE".
How to Bypass School Website Proxy


This is a simple un-tested way to bypass the school website proxy using Dreamweaver MX or higher. This may not always work, but it is worth trying.
Note: This technique does not work on systems controlled from a main server.
1.Open Dreamweaver MX or higher and make a new PHP dynamic page
2.Save the file as anything you want to and save it to the desktop or again anywhere you want to
3. Go back to the Dreamweaver program and click on the icon "server debug" (it looks like a world with a lightning bolt on the top of it)
4.It will then come up with a new bar on the page with the location of the file, in here replace the file name with the website that you want to visit and you should go through
5. Use Dreamweaver as a browser from here.
6. Or to view google images without downloading search something then change the following in the address bar: the hI to a g and the word search to images.
Tips
Since proxies get blocked often you should join a proxy mailing list to keep getting fresh proxies daily.
Bypass Windows Passwords


1.Find the OS (operating system )disc.
2.Insert the OS disc into the Optical Drive.
3.Press F9 to get the Boot options.
4.Select CD/DVD which is normally the 1st option.
5.Wait and get into Recovery Console by selecting Repair on the install screen.
6.Type "notepad" without the quotes in the command line.
7.Select file>>open>>c:>>Windows>>System32>>.
8.Find a magnifier.exe file and delete it.
9.Rename the cmd.exe to magnifier>>.
10.Close the notepad and exit out of recover console by typing exit.
11.Restart the PC and you can now log in to the user name without any passwords.
Warnings
Don't edit any System32 files except the ones mentioned in this article.
How to Break a BIOS Password


DESTOP
Steep
1.Power off the computer and make sure that it is unplugged.
2.Open up your computer case. You need physical access to the motherboard to complete this procedure.
3.Find a circular, (mostly) silver metallic object on the motherboard. This is the CMOS battery.
4.CAREFULLY remove the CMOS battery, avoid touching it with your fingers, and leave it out for about 120 seconds. This will flush the CMOS memory which stores the BIOS password and all other configuration. (See Warnings)
5.Set the battery back into place and power on the computer.
6.The computer should then warn you that the CMOS configuration could not be found. You can either reconfigure it yourself or restore defaults. Restoring the default configuration should be fine.
7.You will notice that the BIOS password has been cleared and you can boot without it. You may reset the BIOS password to something else by going into the BIOS configuration and setting a new User Password (The Supervisor Password controls access to the BIOS, NOT the computer!)
for LAPTOP
1.Remember that laptops can be trickier, especially if it's a newer model. If it has a security chip on the motherboard forget about it. You either have to physically remove the chip or contact the mfg for the "master" password. If you can boot up off of a cd or floppy try any of these methods:
2.Create a Win98SE bootable media "or anything that lets you boot into MS-DOS" and boot off of it.
3.When the A:\> prompt appears type debug and press enter
4.You will then only see a "-".
5.Type o 70 2E "include the spaces" and press Enter.
6.Type o 71 ff "include the spaces" and press Enter.
7.Type q and press Enter.
8.Here are a list of common mfg backdoor passwords:
AWARD BIOS
AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262, j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY, Condo, CONCAT, TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%, %äåâÿòü ïpîáåëîâ%
AMI BIOS
AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder
9.Other passwords you may try (for AMI/AWARD or other BIOSes) - LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj gvs
Tips
Depending on the manufacturer of your motherboard, you may be able to use what it is called a "backdoor password" to bypass the password problem. Try looking at the external links for possible passwords.
Remember that passwords are Case Sensitive. The last two passwords in the AWARD BIOS list are in Russian.
Sometimes the bios reset jumper has a "handle" and is colored a bright color to make it easy to locate. Also, look in your case near the bottom. If it is a manufactured computer then it probably came with a little sticker with the jumpers and the location of the reset jumper.
If you're really stuck, the PC manufacturer can often give out a "reset password" if you can prove you are the owner. This works with Dell but they usually charge.
Warnings
In rare cases, the battery may be soldered into the motherboard and very difficult to remove. If this is true, you may need to find a jumper near the battery that achieves the same result. If you don't know which jumper it is, you CAN test them all. Unplug (really unplug, not just power off) the computer, and start a methodical change in all the jumpers positions, change one, count to ten, change it back, move on the next. After completing the lot of them (on older motherboards this could take a while) plug the PS back in, and boot up. You may risk damaging your computer with this procedure if you are not careful.
Some notebooks such as IBM's ThinkPad render useless when the BIOS password is being tried to reset.
Don't just start pulling jumpers on the motherboard. Make sure you know where it was and in what position in case anything goes wrong put it back.
If you turn your computer on and it makes strange noises / beeps, you should contact the vendor, manufacture, or a tech guy to fix it.
How to Boot to DOS in Windows XP


How to Boot to DOS in Windows XP
1.Insert a blank floppy disk into your floppy drive and navigate to the drive on your computer (which is usually labeled A:).
2.Right-click on the icon and select "Format..."
3.A dialog will pop up. Select "Create MS-DOS Start Up Disk..."
Another dialog will pop up telling you that this format will erase all data on the disk.
4.Click OK.
5.When the formatting is done, restart your computer with the floppy disk still in the A: drive (or your floppy drive letter).
After a couple seconds there will be a message saying in the usual, bland DOS text "Starting..."
It should now show "A:>" or the corresponding drive.
6.Now, you will be able to use MS-DOS!
Warnings
Selecting and Buying a Computer


Choose Your First ComputerChoose Your First Computer
1. Make a budget. Think about how much money you are willing to pay for a computer
2.What purpose will it serve. If it is for basic applications like word processing, then look for a cheap model. If you want to play games, you'll need something with a fast processor, lots of RAM, a large hard drive, and good sound and graphics cards
3.Where will it be used. If you need to take it all over the place, you'll need a laptop. If you intend to leave it in the office or at home on the desk, then buy a desktop.
4.Who is going to use it? If it's for an office and you have to share it, you might need one with more memory and Windows 7 Professional or Ubuntu. If you will be the only one using it, and mostly for playing games, then Windows 7 Home Premium or Vista Home Basic will serve you well.
5.Choose an operating system.
Linux (Ubuntu, Debian, Fedora, OpenSuse and Mandriva) is stable, fast and free.
Microsoft Windows (98, XP, Vista, 7) is the most popular platform in general and for gaming.
Mac OS X (Tiger, Leopard, Snow Leopard) is popular for creative endeavours and multimedia.
6.Choose the hardware Decide whether you want a desktop machine, a laptop that you can take with you, or a netbook. A netbook is a smaller version of the laptop but more portable and with fewer built-in devices such as CD and DVD drives.
7.Decide on the amount of memory Decide how much RAM memory you want your computer to have. Many software have a minimum RAM requirement in order to run. So if your software say it requires 2 GB of memory, and your computer has only one GB of memory, it will not run. The more RAM the better, but it will be more expensive. You should at least have 2 GB or more RAM, unless the only thing you are using the computer for is connecting to the internet (in which case you can do with only 1 GB).
8.Research. Scan the Internet, and become more knowledgeable. Compare prices, and whether the computer can be upgraded as needed. Then you are ready to order, either online, or in a computer store.
TIPS
*If you find a computer you like, compare all the prices. You don't want to pay £700 and find the same thing on eBay for £300.
*If you're only doing basic things like word processing, see if you can use a friend's computer, or go to a library.
Stored program architecture


The defining feature of modern computers which distinguishes them from all other machines is that they can be programmed. That is to say that a list of instructions (the program) can be given to the computer and it will store them and carry them out at some time in the future.
In most cases, computer instructions are simple: add one number to another, move some data from one location to another, send a message to some external device, etc. These instructions are read from the computer's memory and are generally carried out (executed) in the order they were given. However, there are usually specialized instructions to tell the computer to jump ahead or backwards to some other place in the program and to carry on executing from there. These are called "jump" instructions (or branches). Furthermore, jump instructions may be made to happen conditionally so that different sequences of instructions may be used depending on the result of some previous calculation or some external event. Many computers directly support subroutines by providing a type of jump that "remembers" the location it jumped from and another instruction to return to the instruction following that jump instruction.
Program execution might be likened to reading a book. While a person will normally read each word and line in sequence, they may at times jump back to an earlier place in the text or skip sections that are not of interest. Similarly, a computer may sometimes go back and repeat the instructions in some section of the program over and over again until some internal condition is met. This is called the flow of control within the program and it is what allows the computer to perform tasks repeatedly without human intervention.
Comparatively, a person using a pocket calculator can perform a basic arithmetic operation such as adding two numbers with just a few button presses. But to add together all of the numbers from 1 to 1,000 would take thousands of button presses and a lot of time—with a near certainty of making a mistake. On the other hand, a computer may be programmed to do this with just a few simple
History of computing


The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. From the end of the 19th century onwards though, the word began to take on its more familiar meaning, describing a machine that carries out computations.[3]
The history of the modern computer begins with two separate technologies—automated calculation and programmability—but no single device can be identified as the earliest computer, partly because of the inconsistent application of that term. Examples of early mechanical calculating devices include the abacus, the slide rule and arguably the astrolabe and the Antikythera mechanism (which dates from about 150–100 BC). Hero of Alexandria (c. 10–70 AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by a complex system of ropes and drums that might be considered to be a means of deciding which parts of the mechanism performed which actions and when.[4] This is the essence of programmability.
The "castle clock", an astronomical clock invented by Al-Jazari in 1206, is considered to be the earliest programmable analog computer.[5] It displayed the zodiac, the solar and lunar orbits, a crescent moon-shaped pointer travelling across a gateway causing automatic doors to open every hour,[6][7] and five robotic musicians who played music when struck by levers operated by a camshaft attached to a water wheel. The length of day and night could be re-programmed to compensate for the changing lengths of day and night throughout the year.[5]
The Renaissance saw a re-invigoration of European mathematics and engineering. Wilhelm Schickard's 1623 device was the first of a number of mechanical calculators constructed by European engineers, but none fit the modern definition of a computer, because they could not be programmed.
In 1801, Joseph Marie Jacquard made an improvement to the textile loom by introducing a series of punched paper cards as a template which allowed his loom to weave intricate patterns automatically. The resulting Jacquard loom was an important step in the development of computers because the use of punched cards to define woven patterns can be viewed as an early, albeit limited, form of programmability.
It was the fusion of automatic calculation with programmability that produced the first recognizable computers. In 1837, Charles Babbage was the first to conceptualize and design a fully programmable mechanical computer, his analytical engine.[8] Limited finances and Babbage's inability to resist tinkering with the design meant that the device was never completed.
In the late 1880s, Herman Hollerith invented the recording of data on a machine readable medium. Prior uses of machine readable media, above, had been for control, not data. "After some initial trials with paper tape, he settled on punched cards ..."[9] To process these punched cards he invented the tabulator, and the keypunch machines. These three inventions were the foundation of the modern information processing industry. Large-scale automated data processing of punched cards was performed for the 1890 United States Census by Hollerith's company, which later became the core of IBM. By the end of the 19th century a number of technologies that would later prove useful in the realization of practical computers had begun to appear: the punched card, Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter.
During the first half of the 20th century, many scientific computing needs were met by increasingly sophisticated analog computers, which used a direct mechanical or electrical model of the problem as a basis for computation. However, these were not programmable and generally lacked the versatility and accuracy of modern digital computers.
Alan Turing is widely regarded to be the father of modern computer science. In 1936 Turing provided an influential formalisation of the concept of the algorithm and computation with the Turing machine. Of his role in the modern computer, Time magazine in naming Turing one of the 100 most influential people of the 20th century, states: "The fact remains that everyone who taps at a keyboard, opening a spreadsheet or a word-processing program, is working on an incarnation of a Turing machine".[10]
The inventor of the program-controlled computer was Konrad Zuse, who built the first working computer in 1941 and later in 1955 the first computer based on magnetic storage.[11]
George Stibitz is internationally recognized as a father of the modern digital computer. While working at Bell Labs in November 1937, Stibitz invented and built a relay-based calculator he dubbed the "Model K" (for "kitchen table", on which he had assembled it), which was the first to use binary circuits to perform an arithmetic operation. Later models added greater sophistication including complex