Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 13 August 2013

How to make someone think they have malware: Batch File Instructions

Posted on 08:43 by Unknown
This post will contain instructions on how to create a windows batch file that when run will likely make the victim of this prank think that they have malware on their computer. This post is intended for entertainment and amusement purposes only. It is illegal to send batch files electronically, so please do not place a batch file anywhere on the internet.

This post will be somewhat like a previous post in which I gave instructions on how to create a piece of "malware" using VBScript. All I am providing is instructions on how to make the batch file on your own computer, not the actual batch file.

Before we continue, did you read the warnings above? I mean it, read the warnings before continuing.

Got it? Good.

Step #1: Open a new notepad document. You may find notepad by Pressing the windows key and the R key at the same time.

Step #2: Copy and paste the following code into the notepad document:

@echo off
title VIRUS
color 0c

echo YOU HAVE A VIRUS ON YOUR COMPUTER
pause
echo CONTACTING ANTI-VIRUS....
pause
echo DO YOU WANT TO DELETE VIRUS?
pause
echo ACCESS DENIED
echo ACCESS DENIED
echo ACCESS DENIED
pause
echo ACTIVATING VIRUS.....
echo VIRUS ACTIVATED!!!!
pause
:1
dir/s
goto 1

Step #3: Save the document by clicking the file button at the top of the notepad window.
Then click the save as button.

Step #4: Save the document as anything you would like. Just be sure that at the end of the name, you place .bat at the end. (Example.bat) Also make sure that the new batch file is saved in a convenient location such as your desktop, or the desktop of your victim.

Step #5: Keep in mind that if you plan to use this to prank someone, it would be best to create the batch file on their computer. Lure the victim away from his or her computer for a few minutes, then preform steps 1 through 4.

Step #6: Call your victim to the "infected" computer and entice him or her to run the batch file.

Step #7: Some wise computer users will be suspicious, so you will have to convince them in some way to open the batch file.

Step #8: Have fun watching the reaction on your victim's face.

Thank You for reading. I invite readers to comment with any comments or questions. And for those of you wondering what the completed prank will look like:

Once run, the batch file will run through a non stop list of files stored on the desktop.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ▼  August (22)
      • How to remove the Homeland Security Ransomware.
      • How to Remove Antivirus Defence (Rogue)
      • How to Remove Titan Antivirus 2013 (Rogue)
      • History of Windows: Windows 3.0.
      • Looking for Love.
      • How to remove Antivirus Security Pro. (Rogue)
      • How to remove the Savepath Deals Adware
      • History of Windows: Windows 2.0
      • How to remove 24x7 Help.
      • How to remove the Guardians of the Peace of Irelan...
      • How to remove My Safe PC 2014 (Rogue)
      • History of Windows: Windows 1.0
      • How to remove the Webcake Deals Adware.
      • How to remove Antiviral Factory 2013 (Rogue)
      • How to make someone think they have malware: Batch...
      • How to Remove PC Defender 360 (Rogue)
      • Google Glass: Another device, another vector for i...
      • What are Bitcoin Miners?
      • Why you should not let Google Chrome store your pa...
      • What is Rogue Antivirus Software?
      • How to remove Live Security Professional. (Rogue)
      • Never leave your computer's date on February the 14th
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ►  April (15)
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile