This virus has some symptoms when ever you try to open browser and search remove khatra.exe the browser will automatically close, you can’t not delete khatra.exe or gHost.exe or Xplorer.exe which are created by the same virus as these processes will keep running.
Let’s discuss the removal procedure to delete khatra.exe or gHost.exe or Xplorer.exe virus
Fix:
Follow the procedure below
1. Open Task Manager but if task manager is blocked then unblock task manager and click the process tab, found these process named regsvr.exe(if found there), gHost.exe, khatra.exe and Xplorer.exe, right click on all these process and select end process tree
2. Open Start Menu >> Run, type cmd and click Ok button
3. Now download and install everything search tool
4. Run Everything and type the virus exe names one by one ( khatra.exe, gHost.exe, Xplorer.exe ) and delete all the copies found on your computer anywhere.
5. Now Open start menu >> run, type regedit
6. Press ctrl+f and find the registry keys with names khatra,gHost,Xplorer and delete the values you find with these names.
everything
Sunday, November 15, 2009
How To Delete/Remove Khatra.exe/Xplorer.exe/gHost.exe Virus from Your Computer?
LG Reveals Apple’s OLED Touchscreen MacBook Nano
Following on from our posting earlier this month (see: Apple Netbook A Reality? Rumours Suggest Apple Netbook Set for Q3 Release)) an apparent leak emanating from LG Korea has served to add to the speculation concerning Apple’s (wholly unofficial and merely speculated upon) new apple netbook – referred to widely in certain circles now as the McBook Nano.
According to SmartHouse, an unnamed source at LG claim that Apple already have a working prototype of said Apple Netbook (MacBook Nano) utilising an LG OLED touchscreen display that employs additional technology to eliminate marks such as fingerprints from appearing on the screen.
Obviously at this stage, these leaks cannot be confirmed as being gospel, but, as indicated in our previous posting as linked above, anyone who discounts the notion of an apple Netbook being in the works is playing a little too safe for our liking.
Whilst we cannot, of course, substantiate any of these rumours we maintain that they will, in time, prove factual though Apple will undoubtedly take a particularly dim view of any leaks emanating from any of their suppliers (though its not as if the mounting hype is not in Apple’s long term interests).
How To Solve "There Are No Active Mixer Devices Available" Error Message in Windows?
Go to Start > Run and type in: services.msc , and hit enter.Scroll down to "Windows Audio", right-click on it and select Properties, set the startup type to Automatic, click Apply and then click the Start button.
Solution 2:
Computer was giving the error “no active mixer devices available” whenever they clicked on the volume icon in their task bar. This problem came up out of nowhere and it was almost of if the computer never had sound before! In the Sound and Audio Devices applet in Control Panel, everything was grayed out and there was a message saying “No audio device” under the Volume tab
Upon checking under the Hardware section via the System Properties, we found a couple of yellow exclamation points next to Multimedia Audio Controller. Now this issue would have been easy to fix if the computer had a separate sound card installed and would have simply involved downloading and re-installing the latest drive for the card. Sometimes the driver becomes corrupt and the sound disappears. In this case, just go to Dell, HP, or your manufacture’s web site and download the audio drivers.
However, if your sound card is integrated into your motherboard, you’ll have to re-install the motherboard sound drivers. This is a little trickier because you need to first find the make and model of your motherboard. You can figure out the model of your motherboard in three ways:
1. Open the computer and find the sticker or embedded name of the manufacturer. Be sure it’s not the maker of the chipset, as that will not help.
2 Everest software
download hear
3. Belarc Advisor
Download Belarc Advisor
– Another nifty little app that will give you a crap load of information about your computer including the motherboard.
Once you have the model information, you’ll need to perform a search for the number or try to go to the web site of the maker. Find your driver, install it and restart the computer. You should now have your sound back!
!
హిస్టరీ అఫ్ WORMS
Computer worm
From Wikipedia, the free encyclopedia
Jump to: navigation, search
A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Payloads
Many worms that have been created are only designed to spread, and don't attempt to alter the systems they pass through. However, as the Morris worm and Mydoom showed, the network traffic and other unintended effects can often cause major disruption. A "payload" is code designed to do more than spread the worm - it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author - Sobig and Mydoom are examples which created zombies. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address.[1] Spammers are therefore thought to be a source of funding for the creation of such worms,[2][3] and the worm writers have been caught selling lists of IP addresses of infected machines.[4] Others try to blackmail companies with threatened DoS attacks.[5]
Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which spreads better using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005.
[edit] Worms with good intent
Beginning with the very first research into worms at Xerox PARC there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system – by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user.
Some worms, such as XSS worms, have been written for research to determine the factors of how worms spread, such as social activity and change in user behavior, while other worms are little more than a prank, such as one that sends the popular image macro of an owl with the phrase "O RLY?" to a print queue in the infected computer.
Most security experts regard all worms as malware, whatever their payload or their writers' intentions.
[edit] Protecting against dangerous computer worms
Worms spread by exploiting vulnerabilities in operating systems. All vendors supply regular security updates[6] (see "Patch Tuesday"), and if these are installed to a machine then the majority of worms are unable to spread to it. If a vendor acknowledges a vulnerability, but has yet to release a security update to patch it, a zero day exploit is possible. However, these are relatively rare.
Users need to be wary of opening unexpected email,[7] and should not run attached files or programs, or visit web sites that are linked to such emails. However, as with the ILOVEYOU worm, and with the increased growth and efficiency of phishing attacks, it remains possible to trick the end-user into running a malicious code.
Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files at least every few days. The use of a firewall is also recommended.
In the April-June, 2008, issue of IEEE Transactions on Dependable and Secure Computing, computer scientists describe a potential new way to combat internet worms. The researchers discovered how to contain the kind of worm that scans the Internet randomly, looking for vulnerable hosts to infect. They found that the key is for software to monitor the number of scans that machines on a network sends out. When a machine starts sending out too many scans, it is a sign that it has been infected, allowing administrators to take it off line and check it for viruses.
click hear
Batch Commands
Are you interested in batch programming then you have here an excellent material on dos commands.These include commands from the basics.Every command is well explained with syntax and a real time example.Then why are you waiting still? Just click on the below two tutorials and start inventing.
History
Originally command interpreters' primary responsibility was to execute out commands entered manually. Such commands might involve starting programs, carrying out file operations, executing functions concerned with controlling the system, setting preferences or administrative tasks. Sequences of such commands were also sometimes stored in files, which could be later passed to the command interpreter to be read and executed, so such stored sequences could be termed sets of 'batch commands'.
Over time, command interpreters or 'shells' grew additional features, as such stored sequences of such 'batch commands' became more complex, and command interpreters evolved into something more akin to interpreters for a kind of limited programming languages or 'script'. Additional commands, advanced syntactic features and computation abilities were added which allowed sophisticated programs to be written so that batch files or scripts could contain a mixture of commands of the traditional.
[edit] Early influences
Microsoft DOS batch language was influenced by various Unix shells, as well as other text-based command line interfaces from the early 1980s such as CP/M which in turn took much of their inspiration from TOPS-10 and TOPS-20 from Digital Equipment Corporation. Although a DOS batch file is analogous to a shell script in Unix-like operating systems, the syntax and range of commands available is less sophisticated.
[edit] DOS
The first example of Microsoft's batch files were the .bat files used by DOS. The operating system used COMMAND.COM to process commands and batch files. Commands were either internal (part of COMMAND.COM), or if they were too large to keep in the main file; external, where COMMAND.COM would look for the command each time it is requested at the prompt (or display an error message if it didn't exist). This meant that if one wanted, they could add commands to DOS, and in turn allow more functionality to batch files when using the new commands.
An example of an important batch file was AUTOEXEC.BAT which automatically runs after DOS loads during booting. It typically had commands to load drivers.[2]
[edit] Enhancements and alternatives
The limitations of the DOS command intrepreter led to various non-Microsoft interpreters to provide enhanced syntax by providing "enhancement" commands such as those in the Norton Utilities (like the BE or Batch Enhancer), in 1989 the replacement shell 4DOS.
[edit] Early Windows
Microsoft Windows was introduced in 1985 as a GUI Operating System alternative to text-based operating and was designed to run on MS-DOS. In order to start it the WIN command was used and could be added to the end of the AUTOEXEC.BAT file to allow automatic loading of Windows. In the earlier versions one could run a .bat type file from Windows in the MS-DOS Prompt.
Windows was based on MS-DOS and used COMMAND.COM to run .bat files on the following operating systems:
* Windows 1, 2 and 3.
* Windows 95 and 98.
* Windows ME (access to real mode MS-DOS was restricted).
[edit] OS/2
The IBM OS/2 operating system supported DOS-style batch files. It also included a version of REXX, which was a more advanced scripting language. IBM and Microsoft started developing this system but during the construction of it broke up after a dispute, as a result of this IBM referred to their MS-DOS like console shell without mention of Microsoft; naming it just DOS, although this seemingly had no impact on the way batch files worked.
[edit] Windows NT
The Microsoft Windows NT-family of operating systems featured a second, new command interpreter cmd.exe. CMD was far more sophisticated than its DOS counterpart, the old COMMAND.COM interpreter which was also retained but launched inside an MS-DOS virtual machine emulator facility. CMD batch files may have extensions either .cmd or .bat.
[edit] Filename extensions
* .bat: The first extension used by Microsoft for batch files. This extension can be run in most Microsoft Operating Systems, including MS-DOS and most versions of Microsoft Windows.
* .cmd: Designates a Windows NT Command Script, which is written for the Cmd.exe shell, and is not backward-compatible with COMMAND.COM.
* .btm: The .btm file extension is used by 4DOS and 4NT rather than Command Prompt or COMMAND.COM. This non-Microsoft Filename extension when used with larger scripts is faster than .cmd or .bat scripts because it is all loaded at once into one command, rather than line-by-line (as it is done with .bat and .cmd extensions).[3]
[edit] Differences
The only known difference between .cmd and .bat file processing is that in a .cmd file the ERRORLEVEL variable changes even on a successful command that is affected by Command Extensions (when Command Extensions are enabled), whereas in .bat files the ERRORLEVEL variable changes only upon errors.[4]
[edit] Example
@ECHO OFF
ECHO Hello World!
ECHO.
PAUSE
To execute the file it must be saved with a .bat or .cmd extension in plain text format (with a program like Notepad).
[edit] Result
When executed (either from Windows Explorer or Command Prompt) this is displayed:
Hello World!
Press any key to continue . . .
[edit] Explanation
Batch files are executed by every line being executed in order until the end is reached or something else stops it (such as the key shortcut for terminating batch processing; 'Ctrl' + 'C'). This batch file first turns off the 'echo' with ECHO OFF. This stops the display of input from the batch file and limits the display to output from commands only. Since this command is executed before the input is silenced, the @ symbol is used at the start of the command which stops that command line showing input. Then the ECHO command is used again in the form ECHO.Hello World! which outputs the line Hello World!. The . is important as it stops the ECHO command confusing an attempt to output a line with 'ON' or 'OFF' at the start with an attempt to change the state of showing input, and it is easier to tell which lines are outputs with the . there as a visual aid. Then the command ECHO. is used which adds the empty line below Hello World!, again using the . so that the command doesn't output the input display's state (ECHO is on. or ECHO is off.) and just outputs an empty line. Then the PAUSE command is used which pauses execution until the user presses a key. The Press any key to continue . . . prompt is output by the command. Lastly, after the user presses a key the command ECHO ON is used which turns the prompt and input on again, so that if the file is executed from the Command Prompt, rather than Windows Explorer then when the execution ends the user can see the prompt again to use normally. After the last line is reached the batch file ends execution automatically. If it was started from the command prompt (by entering the name of the file when in its directory) then the window remains when finished, but when started from Windows Explorer the window automatically closes upon the end of execution.
[edit] Future
Microsoft hasn't officially released information pertaining to the future of Command Prompt (host for .bat and .cmd files) yet, but the company is now starting to include Windows PowerShell in releases for newer Operating Systems, which has all the core functions of Command Prompt and more (and instead of .bat and .cmd files, it runs .ps1 files). Yet it is important to remember that it is not certain this will replace Command Prompt, and that Microsoft is still making important tools for Command Prompt specifically, instead of for PowerShell (such as servermanagercmd.exe, which incorporates the entire set of Server Manager functions for Windows Server 2008).[5]
[edit] Other Windows scripting languages
In addition to traditional batch files, the need for more powerful capabilities has led to the development of other Windows-specific scripting languages:
* .kix: KiXtart was developed by a Microsoft employee in 1991, specifically to met the need for commands useful in a network logon script while retaining the simple 'feel' of the traditional batch file.
* .vbs and .js: Released in 1998, Windows Script Host (comprised of cscript.exe and wscript.exe) allows the running of scripts written in VBScript or JScript. They can be run in windowed mode (with the wscript.exe host) and console-based mode (with the cscript.exe host). They were included as a part of Windows since Windows 98.
* .ps1: In 2006, Microsoft released a further raw-text script processor, Windows PowerShell, which can be used with Windows XP (SP2/SP3) and above. This is designed for both interactive use from a command line interface, and also for writing scripts, and has a strong resemblance to Unix shells.[6]
In addition to these, powerful cross platform scripting tools such as Perl and Python are now available for Windows.
Explanation
Batch files are executed by every line being executed in order until the end is reached or something else stops it (such as the key shortcut for terminating batch processing; 'Ctrl' + 'C'). This batch file first turns off the 'echo' with ECHO OFF. This stops the display of input from the batch file and limits the display to output from commands only. Since this command is executed before the input is silenced, the @ symbol is used at the start of the command which stops that command line showing input. Then the ECHO command is used again in the form ECHO.Hello World! which outputs the line Hello World!. The . is important as it stops the ECHO command confusing an attempt to output a line with 'ON' or 'OFF' at the start with an attempt to change the state of showing input, and it is easier to tell which lines are outputs with the . there as a visual aid. Then the command ECHO. is used which adds the empty line below Hello World!, again using the . so that the command doesn't output the input display's state (ECHO is on. or ECHO is off.) and just outputs an empty line. Then the PAUSE command is used which pauses execution until the user presses a key. The Press any key to continue . . . prompt is output by the command. Lastly, after the user presses a key the command ECHO ON is used which turns the prompt and input on again, so that if the file is executed from the Command Prompt, rather than Windows Explorer then when the execution ends the user can see the prompt again to use normally. After the last line is reached the batch file ends execution automatically. If it was started from the command prompt (by entering the name of the file when in its directory) then the window remains when finished, but when started from Windows Explorer the window automatically closes upon the end of execution.
Question book-new.svg
This article needs additional citations for verification.
Please help improve this article by adding reliable references. Unsourced material may be challenged and removed. (May 2009)
Batch file Filename extension .bat .cmd .btm
Type of format Scripting
Container for Shell scripts
In DOS, OS/2, and Microsoft Windows, a batch file is a text file containing a series of commands intended to be executed by the command interpreter. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe, or Wscript.exe or cscript.exe) reads the file and executes its commands, normally line-by-line. Batch files are useful for running a sequence of executables automatically and are often used by system administrators to automate tedious processes.[1] Unix-like operating systems (such as Linux) have a similar type of file called a shell script.[2]
DOS batch files have the filename extension .bat. Batch files for other environments may have different extensions, e.g. .cmd or .bat in the Microsoft Windows NT-family of operating systems and OS/2, or .btm in 4DOS and 4NT related shells. The now-obsolete Windows 9x family of operating systems only recognize the .bat and .btm extension.
Contents
Tutorial 1
Tutorial 2
Tutorial1 3