Here comes God Father of WANNACRY

love to Share

Tech Stuffs - Eternal Rocks Wannacry

Eternal Rocks - The God Father

So at ths moment everyone shouting out wannacry, wannacry wannacry, that too almost 150 countries being affected by wannacry, Here comes the God Father of Wannacry - "EternalRocks"

So what is this?

We all know Wannacry is a frightening trojan, an ransomeware which is spreading around. So what is this EternalRocks?

Read: WannaCry - All you need to know

EternalRocks - The BiG Boss

This EternalRocks is similar to Wannacry but this is more frightening than that. Yes!! This eternalrocks is a new malware which exploits same vulnerability as Wannacry and it is very stronger than the latter. 
boss of wannacry - eternalrocks

This EternalRocks as similar to wannacry, uses "EternalBlue" a tool from NSA to spread itself from one computer to another. In addition to that it also utilizes other NSA tools to make it spread faster than wannacry.

So how to protect from it? Here are few tips from our side.

Share and Care!!

WannaCry - All you need to know

love to Share

This malware strike that was unprecedented started last week, crossing the world, and security researchers estimated that of the day on Friday. Almost 57,000 computers in more than 150 nations were infected. It was barely stopped while the spread of the terrifying ransomware was impeded on Saturday.

WannaCry is far and away the most serious malware attack up to now in 2017, as well as the spread of the ransomware that is troubling is far from over. In this post, we’ll tell you what WannaCry, the best way to guard yourself, and what found in the last eight days.

What's WannaCry?

Above all, let’s clarify just what WannaCry is. This malware is a frightening sort of trojan virus

Just what does WannaCry do?

By encrypting most or even all the files on a user’s computer RansomWare like WannaCry operates. Subsequently, the application's requires a ransom be paid so that you can get the files. In case the user does pay the ransom ain't the amount doubles to $600. After seven days without payment, WannaCry will delete every one of the files that are encrypted and all information is going to be lost.

Was WannaCry created?

When a band of hackers called Shadow Brokers released the information on the exploit to people, the security hole was subsequently made.

Is the strike over?


European nations were hit the hardest, and company ground to some halt at organisations and several big businesses, including government agencies, and banks, hospitals.

On Saturday, a 22-year old security researcher named the spread of the WannaCry virus accidentally impeded when he filed a domain name concealed inside the virus’ code in an endeavour to monitor the spread of WannaCry, unintentionally discontinuing its advancement in the procedure. It's possible for you to read Hutchins’ narrative in his blog post titled to Unintentionally Quit a Worldwide Cyber Attacks.”

Sadly, the spread of WannaCry wasn’t really quit, but instead impeded.

How to shield myself?

Especially, Windows users with machines that run Windows Server 2003, Windows 8, or Windows XP should promptly install this security update.  Also, read How to protect yourself from viruses?

If my computer is infected with WannaCry exactly what do I do?

Unfortunately, there isn't any confirmed fix for WannaCry accessible only at that time. Cybersecurity specialists and antivirus businesses are hard at work seeking approaches to decrypt files on computers that are infected, but no means of third party decryption are accessible now. Hopefully, users that are affected have back-ups in their data accessible, as the sole other choices right now which is proven to operate would be to follow along with the directions offered in the application to cover the ransom.

Want to decrypt the encrypted files?

Researchers have released tools to help people hit by the global WannaCry ransomware. The researchers have released a key to unlock their computers without paying the ransom. The tools, called 'WannaKey' and 'WanaKiwi,' extract the keys to WannaCry encryption codes using prime numbers. However, the tools work only if the affected computers have not been rebooted since being infected with the malware.
Download Wannakey here: WANNAKEY

Hope this is helpful. Share it to world!!

How to avoid Computer Viruses on your Windows PC?

love to Share
How to avoid Computer Viruses on your Windows PC?

Guide on avoiding computer Viruses on your Windows PC

So have you experienced your computer slowing down or recurring shortcuts or popups when plugged in? This may be because of the viruses. So how to save yourself from viruses in your PC?
Here are few tips..

1. Never click on a link or attachment in an email that you are not positive that it's from a trusted source. If you think the e-mail looks suspicious, it may probably be. It never hurts to send an email to verify that it is legitimate.
If you use an email retrieving program, disable the image previews option. Email applications like Outlook, Thunderbird, and others often automatically load attachments for your convenience, but this takes away your ability to decide whether a file is safe to open or not. Check your preferences to disable these settings.

2. Beware of files that have double extension such as .txt.vb or .jpg.exe. As a default setting, Windows often hides common file extensions (normally), meaning that a program like Paint.exe will appear to you as simply Paint. Double extensions exploit this. They hide the second and dangerous extension and reassure you with the first, the safe extension – which is utterly meaningless to your computer. Your system recognises only the extension to the extreme right and runs the file as such. If a common file type whose extension you never see normally suddenly becomes visible for no apparent reason, right-click on it, select Properties, and look for the complete file name with extension. You may be surprised to find out what kind of extension it really has.
To make your file extensions visible, find Folder Options in your Control Panel. Under the View tab, scroll down to Hide Extensions for Known File Types and make sure it is unselected. This way you can ensure before opening any program.

3. Use USB drives with caution. Plugging someone else’s USB drive into your computer (or plugging your own into a computer at, say, an internet café/college) can spread an infection via the drive itself, not the file you’re actually trying to share. Whenever possible, try transferring files via email to keep potentially infected hardware out of the equation. Also, check out any shortcuts available when you plug external hardware.

4. Beware of internet pop-ups. The real danger is that some pop-ups are designed to look like they’ve originated from your computer, which makes you click on it. If you see a pop-up that looks like Windows (or another trusted program’s) anti-virus software but warns you of a problem that needs to be fixed with an extreme level of urgency, it may be a scam. (To be sure, simply close the warning, then open that anti-virus software from your computer to see if the warning is still mentioned.) Other programs report false errors and then offer to fix them if you purchase their software. If you see a new type of anti-virus pop-up that you have not seen before, or if it appears to be from an anti-virus program that you did not install, it is fake. Close the pop-up, update your anti-virus program, and run a full scan. Many of these browser-related apps keep some temporary files on your computer and can store a virus there. To avoid this risk, make sure you clear your browser’s cache regularly.
To clear cache Goto Start - Run - type "temp" and click enter. Delete all the files in the temp folder.

5. Beware of unusual emails from companies you do business with. If you receive an email from a company that you otherwise trust requesting information or recommending that you run a particular file, log into your account on that company’s page and see if there’s a notification there as well. Some scammers will get your trust by copying legitimate businesses’ email styles and using a similar-sounding reply-to address to lower your guard.
Note that good businesses will never request sensitive information, transaction details via email, which is one of the least secure ways of communicating.

6. Install an anti-virus program. Paid versions include Norton, McAfee, F-Secure, and Sophos. Free versions include AVG, Avast, Comodo, BitDefender, and Avira AntiVir. You can download the free versions from their official sites. Make sure you keep your virus definitions updated. Run a full system scan/quick scan weekly.

7. Install an anti-spyware program. Ad-Aware SE, Windows Defender, Malwarebytes, and Spybot Search and Destroy operate against internet malware and spyware that anti-virus programs overlook. Just like anti-virus software, keep it updated and do a full system scan weekly. You can also download Malware bytes, hitman, for free from the web which helps you remove malware from your PC.

8. Use a firewall. Make sure your Windows Firewall is turned on (run a search for Windows Security Center on your computer to configure). You can also install a trustworthy firewall program to help block unwanted internet traffic. Windows firewall is mostly preferred.
Note: You should not run two firewalls at the same time, as this will cause errors and can actually make your computer more vulnerable. If you’ve purchased or downloaded another firewall, make sure to disable Windows Firewall.

9. Set up your Windows Update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both Windows and Internet Explorer. These updates will fix security problems and block many spyware programs and viruses. Note that viruses sometimes piggyback onto trusted updates to infect your computer; however, this is much more typical of outdated updates, as they are less closely monitored. Therefore, it’s best to keep your updates as current as possible.

10. Consider switching to a different web browser. Some web browsers are more customizable than others like tor, mozilla etc., allowing you more control over pop-ups, ads, tracking, and other concerns that all of us face on the internet. Firefox, for example, has a large array of privacy- and security-related add-ons that will allow you to reclaim control over your web experience. Additionally, you can use ad blocker extensions on your browser to avoid annoying ads.

11. Google it. When in doubt about an email, file, warning, email address, advertisement, or anything else that seems suspect, do an online search to see what other people are saying. Throw in the word “scam” to weed out results that may have been placed there by the very people who are trying to cheat you.

We hope this article helped you. If you have any questions feel free to comment down.
Share it so this may help few!!

Remove all your information From Truecaller Database

love to Share

Hello readers!! Here is a shocking news for you. Your phone number as well as your identity is stolen. Yes its true. The true caller database has been hacked by Syrian hackers. They stole around 10 lakhs Indian profiles. Your information can also be at stake. Here is he article that is been released in the times of India regarding the hacking of truecaller database..

Ok now we teach you how to remove your number and details from the app. So that, you may protect it as soon as possible. Do you think just uninstalling the app protects you and your information. If you are not a techie guy/gal then please know this. App is just a medium to help you and earn. All the details login etc is stored in a database. Even this post information is also going to store in a database which is allocated by google for So to remove your details, please Follow the below steps..

Step 1. First open your true caller app.
Step 2. Press on the people icon in the upper left corner
Step 3. Click Settings
Step 4. Click About
Step 5. Click the Deactivate account.

Howdy!! You just deactivated your account. But your information is still in their database. How to remove it?

Follow these steps to remove your number and details fully from their database. Here is a image tutorial for you.
Click this link 

Next type your number followed by the country code  (+91 for India)

Select any reason. Just select “I do not want people to see my name when I make a call”

Leave the other untouched. Write the verification code as shown. (Case Sensitive)

Then click unlist. That’s it ..

You are done with this. Your all information currently from the database will be cleared and your personal information will be safe.

Follow us for more useful info’s …

Get free Domains!!

love to Share

Hello readers today I am going to post one thing which will be very helpful to many bloggers and others. Do you want to pay for buying a domain? No! Not at all.

Get free domains with different extensions here.

GetdotBit - Here you can get free .bit domain name

Go college - Here you can get free .college domain name

mindsandmachines here you can get free .casa and .work domain names

Pop here you can get free .co but is only for Canada and United States 

Comment here if you got it :-)


Learn Python for free

love to Share
Python to specialize

Hi coders!

Here is a opportunity for you all to learn another programming language for free.

What is PYTHON?

Python is an interpreted, object-oriented programming language similar to PERL, that has gained popularity because of its clear syntax and readability.

Learn Python here

Join with us on mail for more.

Download Videos from popular sites without any software

love to Share

I just wanna keep my tongue to the point. No more stories :v. Want to download videos from popular websites like youtube, vimeo, dailymotion etc.,

Just follow the steps. No software's required.

Step 1:
First copy the link of the video you want to watch

Step 2:
Now go to site by clicking here

Step 3:
Now paste the link in the box and proceed.

Step 4:
Click the download button. That's it you are done.

Is this post useful for you? Subscribe us for more updates.

How to get free genuine windows 10 even if you don't have windows 7 or 8

              It’s an old news that Windows 10 will be available as a free download to Windows 7 and Windows 8 users. This upgrade will be available to the users free of cost if they will avail this upgrade offer within one year starting from July 29. Now what if you don’t have Windows 8 or 7 and you want to get your hands on Windows 10?

According to a new process highlighted by Microsoft in a new blog post, you can avail free Windows 10 without Windows 7 or 8. If you are running the Insider Preview of Windows 10, build number 10130, you will be able to get the final release build on July 29 and further releases. Microsoft highlights that this version will be genuine.