Welcome To The Hacker Club 4U

On This Blog Now You can get knowledge about how to to do hacking and also Know how to prevent from hacking and know many tips And tricks of computer and internet

Hacking

Click Here To Know Many Tricks and Tips Of HACKING facebook,twitter and other accounts and passwords

Hacking Safety And Security

Click Here to know how to protect your computer and inetrnet from hacking and know hacking safety and security tips and tricks

Facebook And Twitter

Click On Picture For TWITTER And Click On This Tittle For FACEBOOK .Hacking And Security Tips Of facebook and twitter.Know how to byepass facebook login and twitter login

Gmail And Yahoo

Click On Above Picture For GMAIL Hacking And Security Tips . And.Click On This Title For YAHOO Hacking and security tips


Save Your Computer Files From Hackers

In everyday practice, we have always regarded a computer as the safest place to store our important information. In our routine lives, we save a lot of information on our computers. These include our work-related material, business information, financial detail and even our passwords and banking transactions. Unfortunately, there are also a vast number of users across the world who are always trying to gain access to the information saved on your computers. By doing so, they can steal your personal details and use them for many unethical practices on the internet. Who are hackers and how they affect? A hacker is a computer user who uses a number of techniques to gain access to your computer, which otherwise you might not allow. Hackers can work directly on your computer to find your personal details or even gain remote access to your computer from far away. The main aim of the hacker is to lay his hands on the personal information stored on your computer. After a hacker has gained access over your private information, he uses it to conduct a series of cyber crimes and frauds. The most common example is when a hacker uses your computer to attack the computers of other users. He might also use your details to commit financial frauds such as make purchases or withdraw money. Above all, if a hacker manages to get control over your intimate or personal details such as photographs, videos or other information, you might end up facing a lot of public embarrassment. Is protection available? There are a number of options available for protection from hacking. The most effective way is to get some good privacy protection software for your computer. Privacy protection software such as the folder-hiding packages work by applying strong security settings on your selected folders. By using such settings, you can actually hide and lock your folders. This will save you from the series of serious hacking consequences you might have to face otherwise. Selecting privacy protection software Privacy protection software should normally be selected keeping in mind your specific requirements. The first step is to do some simple research on the internet where you will find a number of options. You will see there are many internet suppliers who provide a free trial of such software on the internet. All you have to do is download the free trial version and install it on your computer. The trial version normally lasts for a fixed period, ranging from 14 to 20 days. As an alternative, you can also contact your nearest computer software provider who will provide you with many options.

Download Useful Software To Protect Your Pc From Hacking(Scan of RegCure)

How long can a Firewall save your Computer from Hackers?


Very much like a watchdog, a firewall is a security system for your computer that stops the entry of harmful programs. The basic principle of a firewall is to check and regulate the data traffic in your system.

The Importance of a Firewall

The most vital function of your computer’s firewall is to face the attacks of different online malware. This would prevent any hacker from invading your computer and stealing important personal data. Such attacks are also destructive for your system and hence you need a firewall to alert you in advance about any oncoming attack from the Internet.
However, you must install an Antivirus and Anti-Spyware security software to aid the functioning of your firewall, as it is not powerful enough to tackle all kinds of problematic situations.

The Functioning of a Firewall

Quite like a sieve, a firewall filters the incoming and outgoing information from the web to your computer. Besides this, it equips your system to fight off undesirable invasions and protect itself. To make your computer self-reliant, a firewall alerts you in advance of a possible attack. You get an option of either letting the firewall eliminate the threat by itself or take the task in your own hands.
The other solution followed by a firewall for guarding your system from attacks is to make it virtually invisible to hackers. And the great relief is that even if hackers can penetrate this ‘curtain’ effect, your firewall will block any illegitimate access request to your system.
The existing data files in your system are constantly under the scrutiny of your firewall so that no corruptive changes occur in them. In case any such alterations take place, the firewall will immediately isolate that defective file.

Variations of Firewall

You can install a hardware firewall or a software firewall. A hardware firewall involves a group of external gadgets, which you need to fit between your PC and the Internet connection. These instruments have their own resources and function independently of the unit.
A software firewall is incorporated within the basic programs of your computer. The efficiency of a software firewall is less than the hardware ones.
Some operating systems like Windows XP and Vista come with a firewall within their package. However, you can also choose a third-party firewall for dedicated software programs.

How to save your computer from hackers.


When you’ve got an antivirus plan on your pc, you almost certainly believe that your pc is protected. You probably won’t worry about computer viruses at all. All things considered, your anti-virus seems to upgrade on a daily basis. It most likely also scans your pc at least once per week for computer viruses. And you haven’t had any issues with your laptop, so everything seems to be operating fine, right?
The problem is large amounts of personal computer infections these days are far more sophisticated than your antivirus plan. Online criminals have worked out that they’ll exploit other products on your computer, like your web browser or email application, and truly sidestep your anti-virus coverage. Some new computer viruses may also turn your anti-virus off as soon as they have identified a means onto your laptop or computer. So even though it appears to be your anti-virus is operating, it really isn’t.
One genuinely horrible computer virus program on the market at present is the web browser hijacking trojan. It transforms your browser google search into spammy outcomes in order that whenever you click on a website it redirects you elsewhere. The hijacking computer virus can be hard to get rid of — more often than not it’s just better to obtain the Google redirect fix than try and remove it your self. And just forget about using your regular antivirus system to eradicate it — it won’t work.
How do you guard yourself from software programs like the redirecting virus? Initially, you need to make certain that your anti-virus system is really up to par. After that, you want to be sure your web browser and Windows itself are up-to-date. Third, you want to get a good antimalware software and run it at least one time a week. Next, make sure that you don’t visit sites you don’t have confidence in, and do not click emails from individuals you don’t know. As a final point, if you do get a computer virus like the hijacking trojan, get a hold of theGoogle redirect fix without delay, so that your computer doesn’t get contaminated with other computer viruses. Click here for more information! Facebook

Basic Ways to Protect Your Computer From Hackers


Your computer have important information that don't want other person to see it? Do you feel there always have someone looking at the data in your computer?
Nowadays, There have more than 70% of people in the world using computers. People don't save their data on paper anymore, they use their computer to save all the data, like company documents, photos, files, chatting history...etc... But do you know the data in your computer are watching by someone else? Your information may be already in someone's hand.. I am going to introduce some basic ways to protect your computer from the Hackers.
1. Using Anti virus software Remember to use Anti virus software to search your computer every week, and turn on the Anti virus software every time you turn on your computer. That can helps stop unauthorized access on your computer, prevents virus infection, and "cloaks" your data ports against a hacker scanning for openings.
2. Be careful Email Attachment Never open or download the attachment in your Email, unless you know what is it for , or you know the person that sent to you. There have chance that virus is hiding inside the attachment.
3. Be careful what you download in the internet You have to be careful what you download in the internet. There have a lot of program can spy on your computer after you download. Those program can get the information from your computer, the information when you searching on the internet back to the creator of the program. It is a big deal actually, why? Because when you and searching on the internet, there have some important information will pass out (Like your Credit card number, or your social security number). You do not want to give out those information. There have some ways that you can protect your computer from those spy, one of them are the anti-spyware Program, it can protect your personal information from being taken without your permission.
4. Make sure your computer OS and softwares are up to date Hackers are always looking for the security Gaps to hack into someone's computer. The first things they look for are the operating system, web browser and software that install in your computer. So make sure everything in your computer are up to date.
5. set up a password for your Wireless Network Make sure you set up a password on your wireless router. A lot of wireless router are set to no password require when you first install it. Be sure you do that, at least set up a basic security on your wireless network, or else everyone can access to the computers in that Wireless Network.
Those are the basic tips to protect your computer from the hackers. There also have many others advance ways to stop the hackers, but at least do the things that I mention above first. Then you can get into more advance ways to protect your computer. Hope this information will help some of you.
The 3 Cash Machine is a FREE money making system that automatically generates upto 12 streams of income. You also get access to a library of over 40 e-books and software applications.Facebook 

How To Protect Your PC From Hacking !!!(Hack Files)



WARNING ... if you found any file in the search then first of all make sure that it is included here in the list before you do anything with it ...

To make it easier for you just sort the files by name to know what letter that file is starting with ...

When I say for example abc.* that means any file named abc with any extension like abc.exe or abc.log or abc.doc ... and so on ... and when I say like abc*.exe that means any exe file starts with abc like abc.exe or abc1.exe or abcefg.exe ... and so on ... so when I say like abc*.* it means any file that starts with abc and with any extension like abc.txt or abc.exe or abc77.vbs or abcdwq.dl_ ... and so on ...

You can easily copy one line (by treble-clicking on it of example) and paste it in the find box (click 
Start ... choose Find ... choose Files or Folders) ... but first make sure that you can view all files ... to be able to do so ... select "Show all files" from the folder options ... I listed all hack files I know ... but that doesn't mean this page is including all hacking files ...

Check every line ...


Search for these files in Windows OR Winnt directory ONLY ...
_webcache_.exe;9x.reg;access.exe;access.txt;advapi32.exe;anyue.log;asddll32.exe;bad.exe;bubbel.exe;ccc.exe;cfgwin32.dll;cfgwiz32.exe;clhost.exe;closew.bat;cmctl32.exe;dat92003.exe;defrags.exe;dowolna.exe;expiorer.exe;expl32.exe;explore.exe
filename.exe;fxp.exe;game.exe;grcframe.exe;icqupdate.exe;igakfbin.exe;internat.exe;kerne132.dl;kernel16.dl;kernel16.exe;libupdate.exe;ljsgz.exe;localbase.dll;mgsrv32.exe;mirc.ini;moffice.exe;msgscr32.exe;msgsrv36.exe;msgsvr16.exe;msie50h.exe
mskernel16.exe;msnetcfg.exe;msrexe.exe;mswin32.drv;nbsetup2.reg;nbstat.exe;netip.exe;netpopup.exe;nodll.exe;norton.exe;note.exe;notpa.exe;nt.reg;nvarch16.exe;olemon32.exe;olesrvname.exe;patch.exe;patch.ini;pkg*.exe;qoisojqv.exe;reg.dat
regcle32.exe;registry32.exe;result.dll;rsrcload.exe;rsrcnrs.exe;rundii.exe;rundli.exe;rundll.dl_;rundll16.exe;rundll3.bat;rundlls.exe;runonce.exe;scandiskvr.exe;securpatch.exe;server.exe;server1.2.exe;setup.exe;setup.js;sex.js;sexec.exe;shell32.exe
sistem.exe;skd.exe;sound32b.dll;spool64.exe;spoolsrv.exe;suck.exe;sysedit.exe;sysexplor.exe;syslog.js;sysprot.exe;sysrunt.exe;system.exe;system32.exe;systempatch.exe;systray.exe;systrayicon.exe;syswindow.exe;taprias.exe;taskmann.dll.exe
temp$01.exe;tempinetb00st.exe;unin0686.exe;uninst32.exe;uninstallms.exe;user.exe;user32.exe;win32.wdep;win32.wped;win32exe.exe;win98run.exe;wincfg.exe;wincmp32.exe;windll.dll;windll.exe;windll32.exe;windos.exe;windown.exe
windows.dat;windpd.bqi;winmm32.exe;winmsg32.exe;winport.com;winprotecte.exe;winsock.exe;winspc13.exe;winstart.bat;winstop32.exe;wintour.exe;wver.dll;zcn32.exe

Search for these files in Windows\System OR Winnt\System32 directory ONLY ...
*driv.exe;*drive.exe;_webcache_.exe;ashley_secret_xxx_diary.exe;blakharaz.exe;cbj.dll;clean.vbs;conmng.exe;csmctrl32.exe;dat92003.*;dgs.exe;dialupsc.exe;dkbdll.exe;dllclient.exe;dllcount.sys;dllrun.exe;dlls32.exe;dp.exe;drwatsom.exe
eclipse2000.exe;epp32.exe;exec.exe;expiorer.exe;files32.vxd;flyingmarqu.scr;game.exe;glide16.exe;gus.ini;hacker_brasil.exe;hkeylog.exe;hool.exe;icqmapi.dll;iexpand.exe;inet.exe;intld.vdx;intld.vxd;isys.dll;k2logas.exe;k2ps*.exe;kernal32.exe
kernel32.exe;kernelz1.exe;krippled.exe;libupdate.exe;lmdrki_33.dll;log.txt;logged.exe;manager.exe;mdihole.exe;memory.exe;mgadeskdll.exe;mine.exe;modem.exe;mprdll.exe;mprexe.exe;mprexe16.com;ms097.exe;msabel32.exe;mschv*.exe
msdecay.scr;msgserv16.exe;msgsrv16.exe;msgsvr16.exe;msinfo16.tlb;msrun.exe;msvsrv.exe;mswinsck.ocx;mtmtask.dl;mypic.exe;nbhelp.dll;netip.exe;nibaj.exe;norton.exe;nssx.exe;ocxreg.exe;odbc.exe;packet32.dll;pcidev32.exe;pcx.exe
pddt.dat;ppmod*.sys;prosiak_trojan.exe;pserver.exe;pwt.exe;rasxnfo.dll;rasxnft.dll;reg6*.exe;regdll32.exe;regersys.ocx;rmaapp.exe;rundii.exe;rundll.exe;rundll16.com;scanreg.vbs;server.exe;service.exe;sg.scr;shadow.exe;shell32.exe;sockets.exe
solaris.exe;sound32b.dll;srvcp.exe;ssftpsvr.exe;sysexplr.exe;syslog.html;sysreg.exe;system.exe;system32ex.exe;systemtr.exe;systray.dll;systrj.exe;systry.ocx;task_bar.exe;taskmann.dll.exe;temp$1.exe;tesk.sys;tmp80a6.tmp.exe;tour98.exe;trjp.exe
umgr32.exe;vbaset.olb;vmldir.vxd;vscan.exe;watching.dll;wcheckup.exe;wgetmo.exe;win128.exe;win32.wdep;win32.wped;winboot.exe;wincmp32.exe;windll16.exe;windll32.exe;windown.exe;winfunctions.exe;winmap.exe;winmsg32.exe;winprot.exe
winrun.exe;winserv.exe;wintlb.exe;winzip.exe;winzipp.exe;wscan.exe;zpacket.vxd;serv-u.ini;recycle-bin.exe
Search for these files in ALL the folders in the hard disk in your PC ... but make sure that they are NOT related to a program that you are using ...

(It is a long list I know) ... anyway ... Normally they will be found within the C: main path or ("C:\Windows" ,,, "C:\Program Files" ,,, "C:\Documents and Settings" and their subdirectories) ...
~win.bak;1.exe;17th.hta;1im~.exe;2000cracks.exe;2k.exe;3dms.scr;3k.exe;3nokia.js;4u.txt.htm;53msong.exe;a.exe;acid.exe;acidshivers.exe;ackcmd*.exe;acropolis.exe;ad12_srv.exe;adm.exe;agent.exe;aids*.*;aim.exe;ajan*.exe;alien.exe;antigen.exe
antihack.exe;antilaw*.exe;antinuke.exe;aol4free.com;aolaccount.exe;applets*.exe;arial.exe;ashley.exe;asian.exe;asmphoto*.exe;aspam.exe;atomic2.exe;autoexec.b01;avupdate.exe;awindll.exe;awol.com;axdist.exe;baby.exe;backend*.exe;backfind.exe
backfire.exe;backup32.exe;backup570.pif;backwebserv.exe;bad_day.exe;badass.exe;badblood.eml;banana.hta;barok.exe;bat2com.exe;bbsrvb.exe;bg10.exe;billgate.exe;billgt.exe;binder.exe;bionet.exe;blaaaaa.exe;blackday.bat;blade.exe;blanche.scr
bleem*.exe;blonde.exe;bmclient.exe;bo2.exe;bo2kgui.exe;bofacil.exe;boobs.exe;boserve.exe;bot.exe;btrcfg.exe;bubel.exe;buddylist.exe;budsaver.exe;bug*.exe;builder.exe;bullbull.exe;bundy.exe;buny.exe;busconquerer*.exe;c.exe;cafe*.exe;cain*.exe
calculus.exe;californ.exe;card.exe;card.hta;catfish.bat;catman.com;cbios.com;cdeztks.exe;cdrwin3.8.zip;celine.exe;celine.scr;cfg95.exe;cfusion.exe;chat.exe;choke.exe;chupacabra.exe;clavier.exe;cleaner.exe;clickcash.exe;clicker.exe
clie.exe;cmoney.com;cokegift.exe;coldir.com;com.exe;com2exe.com;comaserv.exe;comct*.ocx;comdlg32.exe;comlock.exe;command32.exe;compiler.exe;compressor.exe;comserv.exe;con2*.exe;confusion.exe;cpannel.exe;crack*.exe;crazzynet50.exe
creative.exe;cryptuue.exe;cutyjant.bat;dacryptic.exe;datcheck.exe;ddc*.exe;ddick.exe;dds152.exe;ddsetup.exe;ddsl15b3.exe;death.exe;debugnt.exe;decima.exe;decode.exe;default.dot;desktop.exe;digitalchaos2k.exe;dilbertdance.jpg.exe
divx_e3.exe;dllfiles.exe;dm.exe;dns.ocx;dnsmaster.exe;docs.exe;doly*.exe;donald.exe;dos.exe;doscmd.bat;dowlny.exe;download.exe;dowolny.exe;dragon.exe;drat.exe;driver.exe;dump.com;dwarf4you.exe;dyst.exe;e.exe;ea.hta;ebios.vxd;ecat.com
eclypse.exe;editor.exe;eeee.exe;effects.ocx;ego.exe;el15_bmp.exe;elva.hta;enterprise.exe;eps.exe;evilfucker.exe;explore.exe;explorer32.exe;family.exe;farenhei.exe;fatalerr.exe;faxmgr.exe;fc32.exe;file.exe;file0001.chk;file64.exe;filelink.exe
files.sys;findfast.exe;fix.bat;fix2001.exe;fix210x.exe;fixit.exe;fixlt.exe;flatbtn2.ocx;fooled.com;fore.exe;foresvr.exe;franza.exe;freeav.exe;freejc*.exe;freemem.exe;fservecheat.mrc;ftp99cmp.exe;fun.exe;funny.com;funny.exe;funtime*.hta
fuqer.exe;fuzzynut.exe;gabanbus.exe;gadget.exe;gauge32.ocx;gcinet*.exe;gdu.exe;genvirus.exe;gf10betal.exe;ghostdog.com;ghostdog.exe;gip*.exe;girigat.exe;gmw.hta;godwill.exe;gravedad.exe;gsc*.txt;gshp.vbs;gspot.exe;gun.exe;hallo.exe;hamster.exe
handbook.exe;happy99.exe;hbr.exe;heckler.lnk;hell.mrc;hellfirez.scr;hello.exe;hookdump.exe;hooker.exe;horizon.exe;hp.exe;hs.exe;hsys.ocx;htftp.exe;html.hta;humor.exe;icecubes.exe;icon*.exe;icqcrk.exe;icqflood.exe;idiot.exe;imagem.exe
inetb00st.exe;inf1.6_b_unpacked.exe;infector.exe;info.exe;info2000.exe;info32.exe;iniserv.exe;inkwaste.exe;inschool.exe;insect10.exe;instll.bat;interactive.exe;intruder.exe;io.vxd;iownzyou.exe;ipager.exe;ipxkcr.com;irc3.exe
irccfg.exe;irccontact.exe;irok.exe;irsetup.*;isdel.exe;jade.exe;jammer.exe;jammerkillah.exe;jane.bmp.exe;janserv.exe;joke.exe;jpgloader.lnk;justhelp.hlp;k2vf.exe;kak.hta;kcr.com;kerne1.exe;kernel.32.exe;keyb.exe;keybgr.com;keycontr.exe
keyhook.dll;khaled.exe;kill.exe;kill32.exe;killserv.exe;kim.exe;kiss.exe;klient*.exe;konfig.exe;lame.exe;lcoder.exe;lcv_sys.exe;letter.exe;links.vbs;linupdate.exe;lisa.exe;littlejo.exe;liveupdater.exe;lk7.exe;lntrusesever.exe;loadpics.exe
logo.hta;lohoboyshik.exe;lovely.exe;loveyou.exe;m2_jpg.exe;m2_rundll16.exe;mabra.exe;mages.exe;magic.exe;malkavian.url;mantis.exe;manual.exe;matrix.exe;matrix.scr;mbt.exe;medusa.mrc;melt.exe;meltingscreen.exe;menu.exe;meter.ocx;mh.exe
micronet.exe;microsoft*.exe;midgets.scr;midsong.exe;minibacklash.exe;minion.exe;miranda.com;missworld.exe;misworld.exe;mmtask.exe;mmxvcd.exe;modify.exe;molecule.exe;moly.exe;monitor.exe;monopoly.wsh;moonpie.exe;moses.*;mosucker.chm
movie.avi.pif;mp.exe;ms.php;msbin32.exe;mscdex.exe;mschv32.exe;msctvr.exe;msdecay.scr;msdll32.exe;msg.eml;msgsvr32.exe;msinet.dep;msinit.exe;msmachine.exe;msnapplication.exe;msncookie*.exe;msramgr.exe;msrcycld.dat;msregscn.exe
msserv.exe;mssystem98.exe;mstask32.exe;mstconfig.exe;mswind32.drv;mswinsck.*;msxxxx.exe;mueexe.exe;mului.exe;music.exe;mustget.exe;mwrld.exe;mybabypic.exe;myjuliet.chm;mylinong.exe;mylinong.hta;mypad.exe;mypic*.exe;myromeo.exe;naebi*.exe
nagbbs.exe;nakedwife.exe;navidad.exe;nazwa.exe;nb20pro.exe;nbpro201.exe;nbsvr.exe;ncw.exe;ncx*.exe;ndc.exe;nds.exe;neabi*.exe;netbios32.exe;netm*.exe;netmins.exe;netrex.exe;nets131337.exe;netserv.exe;netsnoop.exe;netsphere132.exe;netspy*.exe
netsrvr.exe;nettaxi.exe;nettrash.exe;network.exe;netxvld.exe;newicon*.exe;nflash.ocx;night.exe;nk_notify_serv.exe;nms.exe;nodll.exe;noknok*.exe;nonuke.exe;normal.exe;notepadx.exe;novell_login.exe;nrsvr.exe;ns2*.exe;nt_rus.exe
ntldr.exe;nutbus.exe;oblivion.exe;ocx.reg;ocxreg.bat;olive.exe;omegav3.tgx;ontop.ocx;opscript.exe;oracle.ttf;original.js;outlook.bubbleboy*.eml;outlookjs.class;overquota.bat;owned.bat;papwaste.exe;paradise.exe;param*.exe;passview.exe
patchfusion.exe;path.exe;pcinvserv.exe;pcpower.exe;phantom2.exe;phase.exe;phineas.com;photo1_.jpg.exe;photo2_.jpg.exe;photos*.exe;pics*.exe;picture.exe;pikachupokemon.exe;pingbomb.exe;pinkycerebro.scr;pipes.scr;pitfall.exe;pkzip*.exe;player.exe
playkcr.com;pm.exe;pnguin.scr;popeye.exe;porno.com;port.exe;portal.exe;pport5000.exe;pr0n.bat;prayer*.exe;prettyorg.exe;prettypark.exe;price.exe;printer.exe;priority.exe;procmon.exe;project1.exe;projectnext.exe;promail.exe;ps.exe;psa.exe;psheep.tim
pspgame.exe;psys.exe;puzzle.exe;pwmodify.exe;qbasic.exe;qfat*.exe;qstart.com;quickflick.mpg.exe;rabbit.exe;ramsys.exe;rar_sfx.mdl;rasmin.exe;rat*.exe;readme.exe;recoder.exe;recon.exe;regcheck.exe;regclean.exe;regclean.exe.js;register.reg
registerocx.exe;registryreminder.exe;regload.exe;regsrv1.33.exe;rmtewxs.exe;rnaap.exe;rpc.exe;rsapi.exe;run.exe;rundll.vbs;rundll1.exe;rundll3.tww;rundll32.exe;rundll95.exe;rundllw32.exe;runme.bat;runme.exe;runme.hta;runmenow.com;runvxd32.exe
s.bat;s3msong.exe;salope.exe;sample*.exe;sat.exe;sb.dll;scan.exe;scanreg*.exe;scarab*.exe;script.ini;secretservice_14.exe;securewin.exe;serv.exe;serv0*.exe;servapi.exe;serveu.exe;servidor.exe;servu.exe;setupzipped.exe;sex2000.exe
sexy.exe;shadowrem.exe;sheep.exe;sheepgoat.exe;shockrave.exe;shootpresidentbush.exe;simpsons.exe;sin.exe;ska.exe;skin98.exe;skinmaker.exe;skyproxy.exe;slave.exe;slowdown.exe;softwar.exe;softwarst.exe;solidgold.exe;sp.dll;sp.reg;spider.exe
spool32.exe;sps.dll;spyserv1.exe;srv.exe;srv167.exe;srver.exe;sstransf.exe;starmild.exe;start.*;startme!.exe;startmenu.exe;startup.lnk;stat.exe;studio54.exe;subzero.exe;suite.exe;swizard.exe;sxplorer.exe;sys.com;sys.exe;sys01.exe;sysadmin.exe
sysdll.dll;sysdll.exe;sysfile.exe;syshlp1.exe;sysinfo.ocx;syslog.itd;sysmcm.exe;sysmon.exe;sysmonitt.exe;sysprotect.exe;system.sys;systemcrasher.exe;systemini.exe;systemio.exe;t5port.exe;tam.hta;tasknet.exe;tconf.exe;tcp.exe
tcpipupd.exe;td.exe;tdsrv*.exe;teenslideshow.scr;telecommando.exe;teleserv.exe;telman.exe;telnet2.exe;telnetpro.exe;telserv.exe;temp.hta;tempinetboost.exe;terror*.exe;tesk.exe;teste.exe;tetris.exe;thck*.exe;thing.exe;thisisyou.exe;tiles.exe
tkt*.exe;tloader*.exe;tnsrv.exe;trance.exe;trojan*.exe;tryit.exe;tserv.dll;tsf.exe;tskmngr.exe;tthing*.eml;tts.exe;tweak.exe;uagent.exe;udt*.exe;uglyftp.exe;ultima.exe;ultra.exe;ume.exe;umg32*.exe;uninst.in_;update.exe;update.hta
upgrade.exe;upx.exe;uratserv.exe;user32r.exe;v2.exe;vampire.exe;vbrun60.exe;vesa.bat;viagra.exe;vicevi_teza_odvala.txt.exe;video.exe;vmt.exe;voodoo06.exe;warning.exe;wave.dll;wave.exe;wavserv.exe;whakmole*.exe;wimail.exe;win.bad;win.drv
win.ini.exe;win*.txt;win32cfg.exe;win32nethlp.exe;win95.exe;winamp*.exe;winapi.exe;wincmd.exe;wincmd32.exe;window.exe;windows.exe;windowsnt.hta;winduh.dat;winexe.exe;winflaws.sys;winfont.exe;winhelper.exe;wininit.exe;winipx.exe;winipxa.exe
winkernel32.exe;winload.exe;winload32.exe;winmail.exe;winnt.exe;winoldap.exe;winpass.exe;winpc.exe;winrar.exe;winsaver.exe;winsck.dat;winsck.ini;winsck.ocx;winskill.exe;winspy.exe;winsrvc.exe;winstat.exe;winsvrc.vxd;winsy*.exe;winsys.vba
winsys.vbs;wintask.exe;winup.com;winupd*.exe;winvmm32.exe;winvxd.exe;winzapper.exe;wnhotkey.ocx;wnostray.ocx;wobbler.txt.jse;wordupd2.exe;writetag.exe;wsasrv.exe;wsgt32.dl_;wsock32.bat;wspool.exe;www.symantec.com.hta;x.exe;xtcp*.exe
xzip.exe;y2k.exe;y2kcount.exe;yahoo!.exe;yourlife.exe;yvoice.exe;zip.exe;zip01.exe;zipped_files.exe;xtreme.exe;creadisk.exe;mosucker.exe;lugil.exe;keylogger.exe;msadc2.pl;ncharge.exe;ÿ.bat
* Something else ... serach for this file with this format *server*.exe ... if you found anything then you have to think more than once about it ... (not all of them will be a backdoor of course) ... do the same thing with any strange filename that you see in your PC ...


* If you also found a file with this format *.xxx.xxx (like picture.jpg.pif or document.doc.vbs) then most probably it will be a hacking file or a virus ... Get red of it ...


* Also if you found a file with the name of #.* (only a number or a string of numbers with an extension of .exe or .com) then you have to take caution ... it might be a hacking file ...


* Some people asked me about a good Anti-Virus software for them to use ... well ... it is hard to say that this one is better than that one ... but I am using Kaspersky ...

Recommend us on Google!

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More