Wednesday 27 January 2021

ALL CMD COMMANDS FOR YOUR WINDOWS

To open CMD, you need to search for CMD in the search box or you can simply press Windows Key + R that will eventually open the Run window,

where you need to type CMD and hit enter.


1. Accessibility Controls - access.cpl

2. Accessibility Wizard - accwiz

3. Add Hardware Wizard - hdwwiz.cpl

4. Add/Remove Programs - appwiz.cpl

5. Administrative Tools - control admintools

6. Automatic Updates - wuaucpl.cpl

7. Bluetooth Transfer Wizard - fsquirt

8. Calculator - calc

9. Certificate Manager - certmgr.msc

10. Character Map - charmap

11. Check Disk Utility - chkdsk

12. Clipboard Viewer - clipbrd

13. Command Prompt - cmd

14. Component Services - dcomcnfg

15. Computer Management - compmgmt.msc

16. Control Panel - control

17. Date And Time Properties - timedate.cpl

18. DDE Shares - ddeshare

19. Device Manager - devmgmt.msc

20. Direct X Troubleshooter - dxdiag

21. Disk Cleanup Utility - cleanmgr

22. Disk Defragment - dfrg.msc

23. Disk Management - diskmgmt.msc

24. Disk Partition Manager - diskpart

25. Display Properties - control desktop 

26. Display Properties - desk.cpl

27. Dr. Watson System Troubleshooting Utility - drwtsn32

28. Driver Verifier Utility - verifier 

29. Event Viewer - eventvwr.msc

30. Files and Settings Transfer Tool - migwiz 

31. File Signature Verification Tool - sigverif

32. Find fast - findfast.cpl

33. Firefox - firefox 

34. Folders Properties - control folders

35. Fonts - control fonts 

36. Fonts Folder - fonts

37. Free Cell Card Game - freecell

38. Game Controllers - joy.cpl

39. Group Policy Editor (for xp professional) - gpedit.msc

40. Hearts Card Game - mshearts

41. Help and Support - helpctr

42. Hyper Terminal - hypertrm

43. IExpress Wizard - iexpress 

44. Indexing Service - ciadv.msc

45. Internet Connection Wizard - icwconn1

46. Internet Explorer - iexplore 

47. Internet Properties - inetcpl.cpl

48.Keyboard Properties - control keyboard 

49. Local Security Settings - secpol.msc

50. Local Users and Groups - lusrmgr.msc

51. Logs You Out Of Window - logoff

52. Malicious Software Removal Tool - mrt 

53. Microsoft Chat - winchat

54. Microsoft Movie Maker - moviemk

55. Microsoft Paint - mspaint 

56. Microsoft Synchronization Tool - mobsynk

57. Minesweeper Game - winmine

58. Mouse Properties - control mouse

59. Mouse Properties - main.cpl

60. Netmeeting - conf

61. Network Connections - control netconnections

62. Network Connections - ncpa.cpl

63. Network Setup Wizard - netsetup.cpl

64. Notepad - notepad 

65. Object Packager - packager

66. ODBC Data Source Administrator - odbccp32.cpl

67. On-Screen Keyboard - osk

68. Outlook Express - msimn 

69. Paint - pbrush

70. Password Properties - password.cpl

71. Performance Monitor - perfmon.msc

72. Performance Monitor - perfmon

73. Phone and Modem Options - telephone.cpl

74. Phone Dialer - dialer

75. Pinball Game - pinball

76. Power Configuration - powercfg.cpl

77. Printers and Faxes - control printers

78. Printers Folder -  printers 

79. Regional Settings - intl.cpl

80. Registry Editor - regedit

81. Registry Editor - regedit32

82. Remote Access Phonebook - rasphone

83. Remote Desktop - mstsc

84. Removable Storage - ntmsmgr.msc

85. Removable Storage Operator Requests - ntmsoprq.msc

86. Resultant Set of Policy (for xp proffesional) - rsop.msc

87. Scanner and Cameras - sticpl.cpl

88. Scheduled Tasks - control schedtasks

89. Security Center - wscui.cpl

90. Services - service.msc 

91. Shared Folders - fsmgmt.msc

92. Shuts Down Windows - shutdown

93. Sounds and Audio - mmsys.cpl

94. Spider Solitare Card Game - spider

95. SQL Client Configuration - cliconfg

96. System Configuration Editor - sysedit

97. System Configuration Utility - msconfig

98. System Information - msinfo32

99. System Properties - sysdm.cpl

100. Task Manager - taskmgr

101. TCP Tester - tcptest

102. Telnet Client - telnet

103. User Account Management - nusrmgr.cpl

104. Utility Manager - utilman

105. Windows Address Book - wab

106. Windows Address Book Import Utility - wabmig

107. Windows Explorer - explorer

108. Managing the Boot Configuration Data - bcdedit

109. Editing Boot Settings - bootcfg

110. Encrypting or Decrypting Files/folders - cipher

111. Clearing the screen - cls 

112. Managing stored usernames/password - cmdkey

113. Changing CMD Colour - color

114. Compressing one or more files - compress 

115. Converting FAT drives to NTFS - convert

116. Delete files - del

117. Deleting User Profiles - delprof

118. Displaying the list of files and folders - dir

119. Displaying a message on the screen - echo

120. Deleting one or more files - erase

121. Opening the windows explorer - explorer

122. Formatting a disk - format 

123. Knowing file extension - ftype

124. Displaying the Mac Address - getmac 

125. Online Help - help

126. Displaying the Host Name - hostname

127. Editing disk label - label 

128. Log a User off - logoff

129. Get a log time in a file - logtime

130. Creating cab files - makecab

131. Creating a new folder - md

132. Opening Windows Installer - msiexec

133. Managing the network resources - net

134. Knowing the permission for a user - perms 

135. Testing a network connecting - ping

136. Printing a text file - print 

137. Shutdown computer - psshutdown

138. Checking free disk space - freedisk

139. Know the file and volume utilities - fsutil

140. File transfer protocol - ftp

141. Showing the space used in a folder - diskuse 

142. Deleting a folder and subfolders - deltree

143. Importing or exporting Active directory data - csvde

144. Displaying the resultant set of policy information - gpresult

145. Updating the group policy setting - gpupdate 

146. Replacing the files that are currently in use by the os - inuse

147. Comparing two files - fc

148. Finding a text string in a file - find 

149. Finding for a string in file - findstr

150. Displaying the memory usage - mem

151. Remote desktop protocol - mstsc

152. Managing the domain - netdom 

So, these are the best cmd commands. I hope these cmd commands will help you a lot.

Sunday 3 January 2021

WHAT IS MALWARE IN COMPUTER?

Malware is the collective name for a number of malicious software variants, including viruses, ransomware, and spyware. In another way, we say that Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.

A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper, and scareware.

Malware can also be installed on a computer "manually" by the attackers themselves, either by gaining physical access to the computer or using privilege escalation to gain remote administrator access. 

Another way to categorize malware is by what it does once it has successfully infected its victim's computers. There is a wide range of potential attack techniques used by malware:

  • Spyware is defined by webroot cybersecurity as "malware used for the purpose of secretly gathering data on an unsuspecting user." In essence, it spies on your behavior as you use your computer, and on the data, you send and receive, usually with the purpose of sending that information to a third party. A keylogger is a specific kind of spyware that records all the keystrokes a user makes—great for stealing passwords.
  • Adware is malware that forces your browser to redirect to web advertisements, which often themselves seek to download further, even more, malicious software. As The New York Times Notes adware often piggybacks onto tempting "free" programs like games or browser extensions.
  • Ransomeware is a flavor of malware that encrypts your hard drive's files and demands a payment, usually in Bitcoin, in exchange for the decryption key. Several high-profile malware outbreaks of the last few years, such as Petya, are ransomware. Without the decryption key, it's mathematically impossible for victims to regain access to their files. So-called scareware is a sort of shadow version of ransomware; it claims to have taken control of your computer and demands a ransom, but actually is just using tricks like the browser redirect loops to make it seem as if it's done more damage than it really has, and unlike ransomware can be relatively easily disabled.
  • Cryptojacking is another way attackers can force you to supply them with Bitcoin—only it works without you necessarily knowing. The crypto mining malware infects your computer and uses your CPU cycles to mine Bitcoin for your attacker's profit. The mining software may run in the background on your operating system or even as JavaScript in a browser window.
  • Malvertising is the use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users’ computers. For example, a cybercriminal might pay to place an ad on a legitimate website. When a user clicks on the ad, the ad's code either redirects them to a malicious website or installs malware on their computer. In some cases, the malware embedded in an ad might execute automatically without any action from the user, a technique referred to as a “drive-by download.”


WHAT IS R.A.T?

 

A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.

RATs are usually downloaded invisibly with a user-requested program - such as a game - or sent as an email attachment.

Once the host system is compromised the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.

Because a RAT enables administrative control. it makes it possible for the intruder to do just about anything on the targeted computer, including:

  • Monitoring user behavior through keyloggers or other spyware.
  • Accessing confidential information, such as credit card and social security numbers.
  • Activating a system's webcam and recording video.
  • Taking screenshots.
  • Distributing viruses and other malware.
  • Formatting drives.
  • Deleting, downloading, or altering files and file systems.

RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. 

The action they perform can be similar to those of legitimate programs.

Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.