Create Virus to Shutdown Pc

How To : Clean your PC and remove malware

If you're concerned that your computer has been infected by spyware and other malicious programs, watch this informational video and find out how to clean and restore your computer back to a normal bill of health. This informative tutorial shows various methods that can be use ...more

How To : Manually remove ThinkPoint / Fake MSE from your PC

If you've ever seen something called ThinkPoint Antivirus on your computer, you have gotten one ofhte most widespread and infectious fake antivirus malware programs out there. To get it off your PC, follow the instructions below, or watch this video for an alternate method if ...more

How To : Recover Lost Files and Images

You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downlo ...more

How To : Create a fake virus to prank your friends

This video in the Pranks & Cons category will show you how to create a non-destructive fake virus on Windows. This video is from Tinkernut. For this right click on your desk top, go to new and select shortcut. Now type in this code 'shutdown 's 't 60 'c "this computer is shutt ...more

How To : Protect your PC in 10 ways

There are 10 major ways to protect your PC. Disable Autorun, in Windows. Make sure that your system is up to date, by setting automatic updates. Always use a log on for your computer that does not have administrative privileges. Use different passwords, and change your passwor ...more

How To : Fix your strict NAT on Xbox Live to open

Your home router is automatically programmed to run firewalls to protect your computer from viruses. Unfortunately, these firewalls often mistake programs needed for online gaming as intruders and block them. In this tutorial, learn how to set you NAT settings to "Open" and ta ...more

How To : Stop computer viruses

You've probably heard a lot about computer viruses — but how do you stop them? This home-computing how-to from the folks at CNET TV will teach you what you'll need to know. For detailed information, and to get started protecting your own Windows PC from malicious code, watch t ...more

How To : Remove spyware, trojans and viruses in Windows

Suspect something's amiss with your desktop computer? Has your Microsoft Windows PC felt slow and sluggish as late? Don't take any chances: check your computer for spyware, trojan viruses and other forms of malware. This free video tech tutorial will walk you through the process.

How To : Boot in safe mode in Windows XP

There are times when you must start up your Windows XP computer system in Safe Mode, for example if you need to remove certain viruses, key loggers, adware, etc. that cannot be removed while in standard mode. If you want to learn how to boot in safe mode in Windows XP, you sho ...more

How To : Restore PC software to factory condition

In this Know Your PC video the instructors show how to perform a recovery on your computer by demonstrating it on the HP TouchSmart PC. This recovery process will work on any HP desktops, HP Pavilions, Compaq Presarios. Your PC might get corrupted if you recently made any chan ...more

How To : Play a fake desktop prank on a coworker

Pull off this easy prank, and – without causing any permanent damage – watch your coworker squirm with frustration. You Will Need * Access to a coworker's computer * A phony desktop graphic * A flash drive Step 1: Create a phony desktop Create a few on your desktop and give t ...more

How To : Remove the Security Tool virus

This video shows you how to easily remove the Security Tool virus. The first thing you have to do is restart you computer. Once restarted, immediately hold down CTRL+ALT+DEL. In the Task Manager you should see: Security Tool. Quickly end it now. The virus is temporarily disabl ...more

How To : Download and Install the Minecraft 1.8 Pre-Release

Update 2: 1.9 Version3 is currently out. Click here to download and install 1.9 Version 3. Update: 1.8 is now officially out! It'll prompt you to update the next time you launch. Be sure to read the rundown of the new 1.8 features and share your thoughts in the 1.8 general im ...more

News : ... A Few Cool FreewarezZz ...

Thanks Anonymous User For This Article, Not Bad Ok SoftzZz...!.!.!.: Step 1 Antivirus The best freeware antivirus is AVG Anti-Virus Free Edition 2011, and you can get him from this site. Step 2 Optimizing tool For me CCleaner is the easiest way to do some things, like: 1. ...more

How To : Secure Your Computer with Norton DNS

There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more

News : Top 25 Firefox Tweaks

How is it that we use Firefox tremendously and yet not care for its needs? You might have noticed Firefox sometimes tends to slow and not respond often. You might have installed countless add-on in Firefox to enhance your using experience, to get the most out of your Firefox u ...more

News : Are You Noob-Positive or Noob-Negative?

noob - Short for "newbie." Someone with little to no experience or skill. In some gaming communities, there is fierce debate over the distinction between "noob" and "newb"—one being derogatory while the other simply indicates being a novice. While some may argue the semantic d ...more

How To : Boot your computer in safe mode

A computer’s safe mode is useful when fixing problems or saving work after, say, your hard drive malfunctions. Safe mode can easily be accessed as your computer starts up and is a useful tool to have in your belt. Maintaining your computer sometimes requires you to boot up in ...more

News : Stop Windows Update from Shutting Down Your Computer

Sometimes windows will shutdown for "updates", which is great and all except when you had an unsaved project in the works or a huge file conversion that you expected to be completed when you wake up, only to find your computer rebooted. Check out the links below for instructi ...more

How To : Stream PC Games to Your Phone Using AMD Link

It is a great time to be a mobile gamer. Not only are there millions of mobile games on the Play Store and App Store, but thanks to some recent developments, we can also even play PC games. AMD recently released an app, which, among other things, lets you play your favorite PC ...more

How To : Make Your Remote Screenshot Captor(Python)

Hi I am a new member of null byte(although I am reading this website from the beginning) and this is going to be my first post. Let me introduce myself first ! I am from Greece, I am working as a network engineer and I am into system and network administration but definitely ...more

How To : Remove the Shortcut Virus from Flash Drives

You encounter this problem many times, when you plug your flash drive, and suddenly you find that all your data has become shortcuts everywhere!!! First thing that we try to use it is an antivirus scan. It may be useful and solve the problem, but it doesn't work always. So w ...more

How To : Easily Tweak, Mod, & Customize Windows 10

Every time Windows gets a significant update, the vast majority of existing tweaking utilities become obsolete. For every option that you fine-tuned with one of these tools on Windows 7 or 8, there's a change in the registry or system settings that cause your tweaks to now poi ...more

How To : ALL-in-ONE HACKING GUIDE

Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more

How To : Run Kali Linux as a Windows Subsystem

Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there ...more

TypoGuy Explaining Anonymity : A Hackers Mindset

CEO's of IT companies doesn't know this because they are not a hacker. Only a true hacker can become a successful Security head officer. Head of Security: Well let me tell you something my good friend. Many companies we have today they are still getting attacked from hackers ...more

How To : Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more

How To : Trap a Tracker

As a hacker or an aspiring one, You need to be careful and anonymous if your doing anything illegal. But you slipped up. Now someone is tracking you! Well luckily you read this post ahead of time and have a backup plan! The first step in remaining safe is to remain anonymous. ...more

Hacking macOS : How to Create an Undetectable Payload

Encrypting payloads and encoding stagers are more effective against macOS than one might think. It's very easy to evade VirusTotal and macOS antivirus software using a few simple tricks. The goal of this project was to locate a known and easily detectable macOS payload, then ...more

How To : Grab All the Passwords

This is a short explanation and tutorial on how to grab saved passwords from Google Chrome, ideally from a meterpreter session. The idea behind this is to understand how saved passwords work and how to keep them safe. Let's have some fun :D Understanding Google Chrome Saved Pa ...more

Hacking Gear : 10 Essential Gadgets Every Hacker Should Try

If you've grown bored of day-to-day hacking and need a new toy to experiment with, we've compiled a list of gadgets to help you take password cracking and wireless hacking to the next level. If you're not a white hat or pentester yourself but have one to shop for, whether for ...more

How To : Some Terms a Hacker Must Know...

Welcome back Hackers\Newbies! Hey guys first of all I would like to explain my absence here in NullByte. I got a little "occupied" with "other things". When I got back, I saw all these HowTo's, articles, Help Questions, I decided, I need to share more of what I have, to you g ...more

Next Page
  • Hot
  • Latest