How to have fun with .bat files
What this trick does is, after conveying a any message it shuts down the computer without any confirmation. In order to create the Shutdown file, follow the below mentioned steps:. NOTE : Use this carefully. If you are playing prank then keep in mind that this may lead to loss as it shuts down the computer forcefully. Using Notepad and VB you can set different keys on your keyboard to toggle continuously.
Following are the 3 tricks using which different keys can be set to toggle simultaneously. Follow the steps given under each head to try out the tricks. Caps Lock Key. Hit Enter Key Continuously. Hit Backspace Key Continuously. In order to end the vbs script stop continuous key presses , open task manage r and end the wscript.
This one is my favorite. This trick can really freak out anyone! Follow the below mentioned steps to perform this trick:. NOTE : In order to stop it. When used this creates a file which asks you to choose a number between and then does a certain action as shown below — Action accompanied by number :.
In order to create the file, follow the steps given below:. Beyond this point it is you that has the power to kill yourself.
Do not cry if you loose your data or anything. There should be a Warning on trick It just started opening multiple Notepads at lightening speed and in less than 3 seconds I saw blue screen of death due to memory issue.
I mean this can lead to data loss too, or may be corrupt the system as well may be. Pretty much any editor will do these things. You can customize the size of the field by specifying the number of squares to display vertically and horizontally, and specify the number of mines to place on the field. Now I know that it looks like I just copied and pasted it straight from the manual, but I really did.
Speaking of minesweeper, you can open notepad and access your browser from it. Or a computer! Damn you need a copy of computers for dummies. Better yet, just buy a mac. The formula has to do with the fact that the phrase is short. I must say.. This is an cool article. I tried all tricks and enjoyed a lot. This makes me paas my time as well.
Hey the antivirus code is wrong it is missing a slash. It says: X5O! Anyway sorry wrong grammar. Maby it does not work because you are typing it wrong. Look over the command twice or trice to get it right. The matrix effect looks like your hacking, I did it at school and my teacher thought I was! I did it on my sister and she swore at me! She said WTF????? You are such a noob the loop command is not for bat files, its for vbs the correct one is :label start goto label. Stop the program from Task manager.
Ha ha.. This is really funny! I mean what would be the name of this task in task manager? Copy the exact code from above. You did not have to shut down your pc. Killing the task from Task Manager could have done the job! I am a little late I guess. You can stop the messages by repeatedly clicking the OK or close buttons in a short space of time. You terminate the process in task manager 2.
Your computer crashes after lots of laaaaaaag 3. You delete the file. Your computer is infected with a very dangerous virus that is about to destroy all defenses. Your encryption has malfunctioned. You were lucky it did for only a fraction of a second. Your computer might experience catastrophic damage any second now! What would you like to do? Wipe hard drive of all data echo B. Let the virus run so you can deal with this the easy way echo C.
Press any key after 30 seconds. We will shut down your system for you. We have kept some of the memory intact so you can safely shut down you system like you would normally. We cannot hold it back much longer. By radame My youtube Follow. About: I am a computer "nerd" and I admit it Did you make this project?
Share it with us! I Made It! Remote Control Light Switch by alanmerritt in Arduino. Reply Upvote. KKtotheAA zazenergy Reply 11 months ago. UglyN 4 years ago. SomeGuyDude 2 years ago. Asimo10 SomeCoder Reply 1 year ago. Wisdomfighter Question 1 year ago.
Answer Upvote. It is path very you want to see the magic. The folders replication will happen on that location. Then run it on the Victims computer to infect it. Batch file can have the ability to modify the DNS hosts. This may also be used for phishing, i. But for this script you need administrative privileges. In the above case whenever the user tries to open www.
Such that he can get the credentials when you entered. The explorer command given inside the file will make file explorer open, then because of loop same batch file is called again which in turn opens up multiple file explorer, likewise it goes on by calling the program itself again and again until the system crashes or hangs up. Application bomber is much like the Fork Bombing that we previously seen, but here when the file executed it will begin to start opening all the applications programmed in that file and the loop continuous until the user closed the cmd terminal which this batch file is running.
This batch program will open up the following applications such as notepad, MS word, Microsoft paint, WordPad, command prompt, file explorer, control panel and Firefox in an infinite loop causing the system to collapse and as a result the system simply crashes or reboots. It will begin to create a lot of user accounts in the system which it is going to executed. And password will also have allotted directly as programmed it is also a random number.
All the user accounts will be assigned administrator rights. The following program is going to flood your computer with folders. This program has the tendency to create more than folders in just less than a minute with random numbers. Above is screenshot from my desktop in the top left corner you can see the flood named batch file. What you are thinking is right. The below code snippet will be going to stop some critical services of windows.
The thing I like most with this piece of code is, it can also stop the services of anti-virus. The victim need to enable or start the stopped services manually.
If you want to make your hands dirty for remapping other keys, you have to refer the ascii codes for each key that was pre-assigned. Pack flooder will be act like ping of death. This will be going to slow down the computer in your network by entering the IP address of the system in our code.
0コメント