Perché è da lì che ho inviato questo messaggio.
I always think of trojans as being programs that allow the attacker to remotely issue commands to the victim.Come avrai già indovinato, il tuo account email è stato hackerato,
If you just add one more line of code that deletes the dll at the end, it would be a very useful privacy tool, preventing people from undeleting files. Umm, cant you just delete c:windowssystem32spceshot.dll Technically, this program wipes the free space on the drive.
RECOMMENDED POSTS FOR YOU A Virus Program to Disable USB Ports A Virus Program to Restart the Computer How to Create a Computer Virus Share 63 Tweet 1 3 Share 13 Related Posts Ways to Encrypt Data to Store in Cloud How to Create a Virus to Block Websites C Program to Print its Own Source Code How to Compile C Programs Comments m0rebel says Apat 6:17 AM You say with this program theres no way to recover the disk space except by formatting the hard drive. This method is described in the post: How to Change the ICON of an EXE file Please pass your comments and tell me your opinion. NOTE: To remove the warning message youve to edit the source code and then re-compile it. Once you accept it, the Trojan runs and eats up the hard disk space. How to test this trojan horse To test the trojan, just run the SpaceEater.exe file on your computer. How to compile the program For step-by-step compilation guide, refer my post How to compile C Programs. Please note that I have not included the executable for security reasons. The algorithm of the Trojan is as follows: Search for the root drive. Hence there is now way to recover the hard disk space other than reformatting the drive. Since the junk file has the.dll extension it is often ignored by the disk cleanup software. This is because, the trojan intelligently creates a huge file in the WindowsSystem32 folder with the.dll extension. The victim will not be able to clean up the hard disk space using any of the cleanup program. Once the disk space is full, the trojan reports that the scan is complete. The rate at which it fills up the hard disk space it too high. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. Now lets move on to the working of our Trojan: The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. In simple words, it is just a program that appears to do a favorable task but in reality performs undisclosed malicious functions that allow the attacker to gain unauthorized access to the host machine or cause a damage to the computer. Lets see how this trojan works: Before I move on to explain the working of this program, you need to know what exactly is a Trojan horse and how it works. The source code for this program is available for download at the end of this post. Since this program is written using a high level programming language, it is often undetected by antivirus programs. This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run.Īlso, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run.
Trojan Hacking Software Download At The.