![]() When you click the batch file, your hosts will be modified and you are almost vulnerable. He can send you a batch file programmed to change your host files there by redirecting you to the target spoofed site instead of the original site. You may have heard about spoofing of websites where a hacker creates an exact copy of the target site and hosts it on a server that has a unique IP address. Now we’ll see how a 2 lines of code can hack your personal accounts. PC users can download it by clicking on a malicious ads, downloading drive.zip file, opening spam e-mails or file-bundles. Drive.bat virus is a malicious cyber infection classified as a Trojan horse. bat extension and double click on it to start the folder replication virus. Just change “C:Documents and SettingsusernameDesktop” to the path where you want to create the folders. Your computer may hang when you open the directory where the folders are created. What is Drive.bat virus Drive.bat virus is a dangerous Trojan horse which is capable of damaging victim's data and making it useless. Using ‘md %RANDOM%’ command a folder is made with random name.Ĥ. Next command ‘goto loop’ moves the control back to the label ‘loop’ and repeats the steps 3 and 4. ![]() ![]() ![]() 1. The first line of the program conventionally sets the echo to off state.Ģ. Then we will be moving to on the Desktop using ‘cd’ command.ģ. Next I declare a loop label to iterate the block below it unconditionally. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |