Petik Archiver 1.0

Total Page:16

File Type:pdf, Size:1020Kb

Petik Archiver 1.0 PetiK Archiver 1.0 17/05/2009 After 7 years to stop coding virus/worms, I decided to assemble all my works. It is sorted by date like this : YYYYMMDD (where Y is the year, M the month and D the day) and the name of the works. In the begining you can see my old website page. Then my works. Newt, my not finish works and some articles. Best reading. PetiK Homepage (last update : July 9th 2002) EMAIL : [email protected] NEW : FORUM FOR ALL VXERS : CLICK HERE PLEASE SIGN MY GUESTBOOK : CLICK HERE 2002: July 9th : GOOD BYE TO ALL VXERS. I LEAVE THE VX-SCENE. I HOPE MY WORKS LIKE YOU AND WILL HELP YOU IN YOUR VX-LIFE. IF YOU WANT TO CONTACT ME, PLEASE WRITE IN THE GUESTBOOK. Special Thanx to : alc0paul, Benny/29A, Bumblebee, Vecna, Mandragore, ZeMacroKiller98and the greatest coder group : 29A July 7th : Add some new descriptions of AV (from Trend Micro and McAfee) July 3rd : Add the binary of my last Worm coded with alc0paul : VB.Brigada.Worm July 2nd : Add a new link : Second Part To Hell June 29th : Add my new tool : PetiK’s VBS Hex Convert and add my last full spread VBS worm : VBS.Hatred June 26th : Add W32/HTML.Dilan June 24th : Add VBS.Park June 22nd : I finish my new worm : VB.DocTor.Worm June 20th : PETIKVX EZINE #2 REALIZED : DOWNLOAD IT and add a new tool : CryptoText and my last worm : VB.Mars.Worm June 19th : Add VBS.Cachemire. Add my new article VBS/HTML Multi-Infection. June 16th : I join a new Virus Group : Brigada Ocho (create by alc0paul) June 1st : Add VB.Lili.Worm. My new worm is released : I-Worm.Haram May 31st : I leave the rRlf group May 23rd : New Ezine : rRlf#2 May 19th : I remove some source. You can find of them in PetiKVX#1 and the other in PetiKVX#2. Finish VB.Visual.Worm published in PetiKVX #2 May 14th : Add W97M.ApiWord May 12th : Add W32.HLLW.Archiver May 10th : Add a new tool to protect against new VBS Worm : PPVBSW May 9th : Add a new macro virus : W97M.AutoSpread May 8th : I join the rRlf group (http://www.rrlf.de). Add HTML.Welcome. May 6th : Add a new article : VBS Tutorial and exist in PDF April 27th : Add VBS.Xchange April 21st : Add all source of my works. April 7th : Add my first Ezine : PetiKVX Ezine #1. My new email is [email protected] March 15th : Add I-Worm.Together March 14th : My new email : [email protected] ([email protected] failed) March 10th : Add W32.HLLW.LiteLo March 9th : Add my articles in PDF format : articlesPDF and 29A#6. March 8th : Add my first VBS worm and HTML virus generator : PSWVG (W32.PSVG.gen : Norton AntiVirus, Constructor.VBS.PSWVG.10 : AVP) March 3rd : Add a new virus/worm : VBS/W97M.Doublet February 25th : Add a macro virus : W97M.Wolf February 24th : Add a lame love worm : HTML.Linda February 22nd : Add W32.HLLW.Wargames February 18th : Add a new Ezine : rRlf February 16th : Add my first virus (perhaps bug) : WinRAR.Linda February 14th : Add a new HTML virus : HTML.Macrophage February 10th : Can download my last worm. Add my second article : Technics February 7th : Finish my last worm : I-Worm.Falken (can’t download immediately) February 4th : Add new worm : I-Worm.Extract February 1st : New Worm : W32/W97M.Twin January 27th : I come back with a new worm : HLLW.SingLung.Worm January 20th : Add PetiKShow. This program contains all the sources of my works. January 10th : Add an old article about Worm Spreading written by me on September 19th. January 1st : HAPPY NEW YEAR. I DECIDED TO STOP TO CODE VIRII AND WORM. GOOD BYE 2001: December 10th : Add my last worm : W32.HLLW.Last November 6th : I-Worm.Anthrax October 12th : I-Worm.WTC September 8th : I-Worm.Passion September 2nd : I-Worm.Rush August 24th : I-Worm.Casper August 18th : Add the tool tElock 5.1 (A compress/encrypted PE file) August 16th : I-Worm.Kevlar August 12th : New design. You can hear one of my compositions. August 9th : New descrption from AVP about I-Worm.MadCow and I-Worm.Friends. August 8th : I-Worm.XFW July 18th : New Fanily : W32.Pet_Tick family (6), VBS.Pet_Tick family (3) from Norton Antivirus July 8th : I-Worm.MaLoTeYa July 3rd : VBS.Delirious June 30 th : I-Worm.Bush June 19th : I-Worm.Winmine June 18th : W97M.Blood June 17th : VBS.Seven June 10th : VBS.Starmania, I-Worm.Gamma, W97M.Kodak June 4th : BAT.Quatuor June 3rd : Bastille, JS.Germinal June 2nd : Add some Worms : HTML.Embargo, I-Worm.Mustard May 25th : I start my homepage. Source You can found here my different worms that I create : AntiVirus Name Real Name Date Description (TM=Trend Micro) It's a DOS worm. It uses mIRC to AVP : IRC.Worm.PetiK Bastille 06/03/2001 spread. On July 14th, he stops TM : Bat.PetiK.A the computer A BAT file which uses mIRC to BAT.Quatuor 06/04/2001 IRC.Becky.A spread. CryptoText 06/20/2002 Coded in VB6. Encrypt ASCII file. It is script that uses ActiveX controls to perform actions. It HTML.Bother.3180 modifies the default home page. It infects to all .HTM and .HTML HTML.Bother 05/13/2001 files that it founds in the \MY AVP : VBS.Both DOCUMENTS and \WINDOWS\WEB TM : HTML.Bother.A folders. The default icon for .html files is changed. It copies itself to \WINDOWS\WinHelp.htm. Change the HTML.Embargo 05/29/2001 VBS.Embaro.A.Intd AUTOEXEC.BAT. It uses mIRC channel to spread HTML.Linda 02/24/2002 Lame love worm. Infect htm,html,htt,hta and asp HTML.Prepend HTML.Macrophage 02/14/2002 files in different special Panda : HTML/Mage folders. My first virus for rRlf group. VBS.Manu@mm Infects web files HTML.Welcome 05/08/2002 (htm,html,htt,asp) and spread TM : VBS.PATIK.G with Outlook into a VBS file. W95.Pet_Tick.gen Open WAB default file to take I-Worm.Anthrax 11/06/2001 some email and spread with MAPI. TM : Worm.Pettick.A Spread with mIRC too. Sophos : W32/Petick-A W95.Pet_Tick.E@mm I-Worm.Bush 06/30/2001 Uses MAPI to spread. Not BUGS. AVP : I-Worm.PetiK.e It‘s a utility which detect I-Worm.Casper 08/24/2001 TM : Worm.Capser.A Happy99 and Icecubes. Uses MAPI. Perhaps bugz. I-Worm.Dandelion 11/16/2001 UNRELEASED WORM Panda : W32/Extract I-Worm.Extract 02/04/2002 Open KERNEL32.DLL to find API. TM : WORM.PETIK.L I-Worm.Falken 07/02/2002 First WGAA Worm. WARNING ! W32.Pet_Tick.B It uses a VBS file and mIRC to W32.Fiend.Worm I-Worm.Friends 05/05/2001 spread. he alters the Window's owner and company. AVP : I-Worm.PetiK.b W95.Pet_Tick.D@mm Scan all *.*htm* file in W95.Wormfix.Worm@mm I-Worm.Gamma 05/09/2001 "Temporary Internet Files" and uses MAPI function to spread AVP : I-Worm.PetiK.c Spread with a randome VBS file in I-Worm.Haram 06/01/2002 StartUp folder and put an HTML virus. Infect C???????.exe. Scans some W32.Pet_tick.M email address in the Outlook I-Worm.Kevlar 08/16/2001 TM : Worm.Kevlar.A Address Book and uses MAPI to Panda : Worm.PetiK.C spread. W32.Pet_Tick.Intd Sophos : W32/Petik-K Uses MAPI function to spread. I-Worm.Loft 06/23/2001 Open some DLL files to uses some AVP : I-Worm.PetiK.k API. TM : Worm.PetiK.K It's my first worm. It uses W32.Pet_Tick.A@mm Outlook and mIRC to spread. It W32.Salut.Worm@mm I-Worm.MadCow 12/01/2000 creates \SYSTEM\MSLS.ICO and will be the default icon of .exe AVP:I-Worm.PetiK.a files. W32.Pet_Tick.G W32.Malot.Int Uses MAPI to spread. Create a HTML file in the StartUp folder I-Worm.MaLoTeYa 07/08/2001 AVP : I-Worm.PetiK.f to send some informations about the user. CONTRIBUTE TO 29A#6. TM : Worm.Malot.A Modify "Exclude.dat" in the W32.Update.Worm "Install Folder" of Norton I-Worm.Mustard 05/27/2001 Antivirus to create a VBS file. AVP : I-Worm.PetiK.d The worm spread with Outlook TM : Worm.Mustard.A which use this VBS file. Copy all mail of Outlook Address Book in a file and scans this I-Worm.Passion 09/08/2001 W95.Pet_Tick.gen file to spread. Change some URL 1 times of 10. W95.Pet_Tick.C@mm W95.Buggy.Worm@mm Modify the Wallpaper with a BMP file that it download to a ftp I-Worm.PetiK 02/07/2001 AVP : I-Worm.IEPatch site. He spread with a VBS file which use Outlook. TM : Worm.PetiK.A Not bugz for MAPI functions. Start of propagation by error on I-Worm.Rush 02/09/2001 TM : Worm.Rush.A August 30th. Some payloads with some titles of windows. I-Worm.Together 03/15/2002 W32.Pet_Tick.AC@mm Kill some AV. 100% assembler. W32.Mineup.Worm AVP : I-Worm.Petik I-Worm.Winmine 06/19/2001 Uses Outlook to spread. McAfee:W32/PetTick@MM Panda : W32/PetTick Sophos : W32/Petik-WTC A Worm against the terrorism. I-Worm.WTC 10/11/2001 Infect RAR files in the Personal TM : WORM.PETTICK.Q directory. W95.Pet_tick.gen Infect WSOCK32.DLL and all DLL I-Worm.XFW 08/08/2001 TM : Trojan.PetiK.XFW files in the SYSTEM directory.
Recommended publications
  • Liste Von Programmiersprachen
    www.sf-ag.com Liste von Programmiersprachen A (1) A (21) AMOS BASIC (2) A# (22) AMPL (3) A+ (23) Angel Script (4) ABAP (24) ANSYS Parametric Design Language (5) Action (25) APL (6) Action Script (26) App Inventor (7) Action Oberon (27) Applied Type System (8) ACUCOBOL (28) Apple Script (9) Ada (29) Arden-Syntax (10) ADbasic (30) ARLA (11) Adenine (31) ASIC (12) Agilent VEE (32) Atlas Transformatikon Language (13) AIMMS (33) Autocoder (14) Aldor (34) Auto Hotkey (15) Alef (35) Autolt (16) Aleph (36) AutoLISP (17) ALGOL (ALGOL 60, ALGOL W, ALGOL 68) (37) Automatically Programmed Tools (APT) (18) Alice (38) Avenue (19) AML (39) awk (awk, gawk, mawk, nawk) (20) Amiga BASIC B (1) B (9) Bean Shell (2) B-0 (10) Befunge (3) BANCStar (11) Beta (Programmiersprache) (4) BASIC, siehe auch Liste der BASIC-Dialekte (12) BLISS (Programmiersprache) (5) Basic Calculator (13) Blitz Basic (6) Batch (14) Boo (7) Bash (15) Brainfuck, Branfuck2D (8) Basic Combined Programming Language (BCPL) Stichworte: Hochsprachenliste Letzte Änderung: 27.07.2016 / TS C:\Users\Goose\Downloads\Softwareentwicklung\Hochsprachenliste.doc Seite 1 von 7 www.sf-ag.com C (1) C (20) Cluster (2) C++ (21) Co-array Fortran (3) C-- (22) COBOL (4) C# (23) Cobra (5) C/AL (24) Coffee Script (6) Caml, siehe Objective CAML (25) COMAL (7) Ceylon (26) Cω (8) C for graphics (27) COMIT (9) Chef (28) Common Lisp (10) CHILL (29) Component Pascal (11) Chuck (Programmiersprache) (30) Comskee (12) CL (31) CONZEPT 16 (13) Clarion (32) CPL (14) Clean (33) CURL (15) Clipper (34) Curry (16) CLIPS (35)
    [Show full text]
  • Microsoft Word 1 Microsoft Word
    Microsoft Word 1 Microsoft Word Microsoft Office Word 2007 in Windows Vista Developer(s) Microsoft Stable release 12.0.6425.1000 (2007 SP2) / April 28, 2009 Operating system Microsoft Windows Type Word processor License Proprietary EULA [1] Website Microsoft Word Windows Microsoft Word 2008 in Mac OS X 10.5. Developer(s) Microsoft Stable release 12.2.1 Build 090605 (2008) / August 6, 2009 Operating system Mac OS X Type Word processor License Proprietary EULA [2] Website Microsoft Word Mac Microsoft Word is Microsoft's word processing software. It was first released in 1983 under the name Multi-Tool Word for Xenix systems.[3] [4] [5] Versions were later written for several other platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), SCO UNIX, OS/2 and Microsoft Windows (1989). It is a component of the Microsoft Office system; however, it is also sold as a standalone product and included in Microsoft Microsoft Word 2 Works Suite. Beginning with the 2003 version, the branding was revised to emphasize Word's identity as a component within the Office suite; Microsoft began calling it Microsoft Office Word instead of merely Microsoft Word. The latest releases are Word 2007 for Windows and Word 2008 for Mac OS X, while Word 2007 can also be run emulated on Linux[6] . There are commercially available add-ins that expand the functionality of Microsoft Word. History Word 1981 to 1989 Concepts and ideas of Word were brought from Bravo, the original GUI writing word processor developed at Xerox PARC.[7] [8] On February 1, 1983, development on what was originally named Multi-Tool Word began.
    [Show full text]
  • Improved Neural Network Based General-Purpose Lossless Compression Mohit Goyal, Kedar Tatwawadi, Shubham Chandak, Idoia Ochoa
    JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 DZip: improved neural network based general-purpose lossless compression Mohit Goyal, Kedar Tatwawadi, Shubham Chandak, Idoia Ochoa Abstract—We consider lossless compression based on statistical [4], [5] and generative modeling [6]). Neural network based data modeling followed by prediction-based encoding, where an models can typically learn highly complex patterns in the data accurate statistical model for the input data leads to substantial much better than traditional finite context and Markov models, improvements in compression. We propose DZip, a general- purpose compressor for sequential data that exploits the well- leading to significantly lower prediction error (measured as known modeling capabilities of neural networks (NNs) for pre- log-loss or perplexity [4]). This has led to the development of diction, followed by arithmetic coding. DZip uses a novel hybrid several compressors using neural networks as predictors [7]– architecture based on adaptive and semi-adaptive training. Unlike [9], including the recently proposed LSTM-Compress [10], most NN based compressors, DZip does not require additional NNCP [11] and DecMac [12]. Most of the previous works, training data and is not restricted to specific data types. The proposed compressor outperforms general-purpose compressors however, have been tailored for compression of certain data such as Gzip (29% size reduction on average) and 7zip (12% size types (e.g., text [12] [13] or images [14], [15]), where the reduction on average) on a variety of real datasets, achieves near- prediction model is trained in a supervised framework on optimal compression on synthetic datasets, and performs close to separate training data or the model architecture is tuned for specialized compressors for large sequence lengths, without any the specific data type.
    [Show full text]
  • C:\Andrzej\PDF\ABC Nagrywania P³yt CD\1 Strona.Cdr
    IDZ DO PRZYK£ADOWY ROZDZIA£ SPIS TREFCI Wielka encyklopedia komputerów KATALOG KSI¥¯EK Autor: Alan Freedman KATALOG ONLINE T³umaczenie: Micha³ Dadan, Pawe³ Gonera, Pawe³ Koronkiewicz, Rados³aw Meryk, Piotr Pilch ZAMÓW DRUKOWANY KATALOG ISBN: 83-7361-136-3 Tytu³ orygina³u: ComputerDesktop Encyclopedia Format: B5, stron: 1118 TWÓJ KOSZYK DODAJ DO KOSZYKA Wspó³czesna informatyka to nie tylko komputery i oprogramowanie. To setki technologii, narzêdzi i urz¹dzeñ umo¿liwiaj¹cych wykorzystywanie komputerów CENNIK I INFORMACJE w ró¿nych dziedzinach ¿ycia, jak: poligrafia, projektowanie, tworzenie aplikacji, sieci komputerowe, gry, kinowe efekty specjalne i wiele innych. Rozwój technologii ZAMÓW INFORMACJE komputerowych, trwaj¹cy stosunkowo krótko, wniós³ do naszego ¿ycia wiele nowych O NOWOFCIACH mo¿liwoYci. „Wielka encyklopedia komputerów” to kompletne kompendium wiedzy na temat ZAMÓW CENNIK wspó³czesnej informatyki. Jest lektur¹ obowi¹zkow¹ dla ka¿dego, kto chce rozumieæ dynamiczny rozwój elektroniki i technologii informatycznych. Opisuje wszystkie zagadnienia zwi¹zane ze wspó³czesn¹ informatyk¹; przedstawia zarówno jej historiê, CZYTELNIA jak i trendy rozwoju. Zawiera informacje o firmach, których produkty zrewolucjonizowa³y FRAGMENTY KSI¥¯EK ONLINE wspó³czesny Ywiat, oraz opisy technologii, sprzêtu i oprogramowania. Ka¿dy, niezale¿nie od stopnia zaawansowania swojej wiedzy, znajdzie w niej wyczerpuj¹ce wyjaYnienia interesuj¹cych go terminów z ró¿nych bran¿ dzisiejszej informatyki. • Komunikacja pomiêdzy systemami informatycznymi i sieci komputerowe • Grafika komputerowa i technologie multimedialne • Internet, WWW, poczta elektroniczna, grupy dyskusyjne • Komputery osobiste — PC i Macintosh • Komputery typu mainframe i stacje robocze • Tworzenie oprogramowania i systemów komputerowych • Poligrafia i reklama • Komputerowe wspomaganie projektowania • Wirusy komputerowe Wydawnictwo Helion JeYli szukasz ]ród³a informacji o technologiach informatycznych, chcesz poznaæ ul.
    [Show full text]
  • User Guide Disclaimer
    HostAccess User Guide Disclaimer Every effort has been made to ensure that the information contained within this publication is accurate and up-to-date. However, Rogue Wave Software, Inc. does not accept liability for any errors or omissions. Rogue Wave Software, Inc. continuously develops its products and services, and therefore reserves the right to alter the information within this publication without notice. Any changes will be included in subsequent editions of this publication. As the computing industry lacks consistent standards, Rogue Wave Software, Inc. cannot guarantee that its products will be compatible with any combination of systems you choose to use them with. While we may be able to help, you must determine for yourself the compatibility in any particular instance of Rogue Wave Software, Inc. products and your hardware/software environment. Rogue Wave Software, Inc. acknowledges that certain proprietary programs, products or services may be mentioned within this publication. These programs, products or services are distributed under Trademarks or Registered Trademarks of their vendors and/or distributors in the relevant country. Your right to copy this publication, in either hard-copy (paper) or soft-copy (electronic) format, is limited by copyright law. You must obtain prior authorisation from Rogue Wave Software, Inc. before copying, adapting or making compilations of this publication. HostAccess is a trademark of Quovadx Ltd in the United Kingdom and is a registered trademark in the USA. Microsoft is a registered trademark and Windows is a trademark of the Microsoft Corporation. Other brands and their products are trademarks or registered trademarks of their respected holders and should be noted as such.
    [Show full text]
  • Bandizip Professional Enterprise V710 Patchserialszip
    1 / 2 Bandizip Professional Enterprise V7.10 Patch-Serials.zip Jun 17, 2021 — Bandizip Enterprise 7.17 Crack 2021 is strong archiver which gives you an ... Bandizip Professional 7.17 Crack + Keygen Free Download 2021 ... It also has support for split compression to certain sizes, such as 10MB or 700MB. ... all kinds of file compression software including WinZip, WinRAR, and 7-Zip.. Sep 8, 2020 — Bandizip Professional & Enterprise v7.10 + Patch-Serials ... BandiZip is an intuitive and fast archiving application that supports WinZip, 7-Zip, .... Mar 31, 2021 — IDM Crack 6.38 Build 19 Patch + Serial Key 2021 [Latest] Free ... VueScan Pro 9.7.51 Crack + Serial Number 2021 64/32Bit ... Torrent 2021: 1Password – Password Manager v7.7.4 Crack + Activation Code. ... [Latest-2021]: Bandizip Enterprise 7.15 Crack is managing zip files in multiple ZIP & 7Z formats.. Installing Windows OS components/upgrades/patches/fixes/drivers. /tools may ... SyncToy v2.1 64-bit for Windows XP Professional/Vista/7 64-bit. (x64) [3.46 MB] .... Bandizip Professional & Enterprise V7.10 + Patch-Serials [ha.. 6 months, Software, 9, 9.10 MB, 1, 0. Magnet Link · Secret Disk Professional V2020.03 Final + .... Apr 3, 2020 — Bandizip has a very fast Zip algorithm for compression & extraction with ... Supported OS: Windows Vista/7/8/10 (x86/x64/ARM64); License: ... Professional and Enterprise. ... Visible serial keys are not allowed even in images.. Mar 6, 2021 — Bandizip Crack is the name of a new, professional program, that ... Bandizip Enterprise 7.15 Crack with Serial Key Free Download: BandiZip Crack is an intuitive and fast archiving app that supports WinZip, 7-Zip, and WinRAR, as well as ..
    [Show full text]
  • Answers to Exercises
    Answers to Exercises A bird does not sing because he has an answer, he sings because he has a song. —Chinese Proverb Intro.1: abstemious, abstentious, adventitious, annelidous, arsenious, arterious, face- tious, sacrilegious. Intro.2: When a software house has a popular product they tend to come up with new versions. A user can update an old version to a new one, and the update usually comes as a compressed file on a floppy disk. Over time the updates get bigger and, at a certain point, an update may not fit on a single floppy. This is why good compression is important in the case of software updates. The time it takes to compress and decompress the update is unimportant since these operations are typically done just once. Recently, software makers have taken to providing updates over the Internet, but even in such cases it is important to have small files because of the download times involved. 1.1: (1) ask a question, (2) absolutely necessary, (3) advance warning, (4) boiling hot, (5) climb up, (6) close scrutiny, (7) exactly the same, (8) free gift, (9) hot water heater, (10) my personal opinion, (11) newborn baby, (12) postponed until later, (13) unexpected surprise, (14) unsolved mysteries. 1.2: A reasonable way to use them is to code the five most-common strings in the text. Because irreversible text compression is a special-purpose method, the user may know what strings are common in any particular text to be compressed. The user may specify five such strings to the encoder, and they should also be written at the start of the output stream, for the decoder’s use.
    [Show full text]
  • Linux Package Management
    Welcome A Basic Overview and Introduction to Linux Package Management By Stan Reichardt [email protected] October 2009 Disclaimer ● ...like a locomotive ● Many (similar but different) ● Fast moving ● Complex parts ● Another one coming any minute ● I have ridden locomotives ● I am NOT a locomotive engineer 2 Begin The Train Wreck 3 Definitions ● A file archiver is a computer program that combines a number of files together into one archive file, or a series of archive files, for easier transportation or storage. ● Metadata is data (or information) about other data (or information). 4 File Archivers Front Ends Base Package Tool CLI GUI tar .tar, tar tar file roller .tar.gz, .tgz, .tar.Z, .taz, .tar.bz2,.tbz2, .tbz, .tb2, .tar.lzma,.tlz, .tar.xz, .txz, .tz zip .zip zip zip file roller gzip gzip gunzip gunzip ● Archive file http://en.wikipedia.org/wiki/Archive_file ● Comparison of file archivers http://en.wikipedia.org/wiki/Comparison_of_file_archivers 5 tar ● These files end with .tar suffix. ● Compressed tar files end with “.t” variations: .tar.gz, .tgz, .tar.Z, .taz, .tar.bz2, .tbz2, .tbz, .tb2, .tar.lzma, .tlz, .tar.xz, .txz, .tz ● Originally intended for transferring files to and from tape, it is still used on disk-based storage to combine files before they are compressed. ● tar (file format) http://en.wikipedia.org/wiki/.tar 6 tarball ● A tar file or compressed tar file is commonly referred to as a tarball. ● The "tarball" format combines tar archives with a file-based compression scheme (usually gzip). ● Commonly used for source and binary distribution on Unix-like platforms, widely available elsewhere.
    [Show full text]
  • Virus Bulletin, November 1996
    ISSN 0956-9979 NOVEMBER 1996 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Ian Whalley CONTENTS Assistant Editor: Megan Skinner EDITORIAL Technical Editor: Jakub Kaminski When the going gets tough, the tough play dirty 2 Consulting Editors: VIRUS PREVALENCE TABLE 3 Richard Ford, Command Software, USA Edward Wilding, Network Security, UK NEWS 1. Sophos Wins 3i Competition 3 2. MicroWazzuSoft…3 3. Takeover for Cheyenne 3 IN THIS ISSUE: IBM PC VIRUSES (UPDATE) 4 • With a macro here, a macro there. The Word macro CONFERENCE REPORT virus phenomenon began with Concept, and is now moving VB ’96: Brighton Rock 6 apace. This edition of VB contains two macro virus analy- ses: NPad, which is spreading rapidly in the wild, and VIRUS ANALYSES Outlaw, which features polymorphism. See p.8 and p.12. 1. NPad: Escape from Indonesia 8 2. Batch Sketches 9 • Let the Word go forth. Word and Excel’s internal file 3. Unsnared and (not so) Dangerous 10 formats have been, until recently, something in which few 4. Outlaw: The Changing Face of Macro Viruses 12 were interested – macro viruses, however, have changed all this. Andrew Krukow discusses the risks; see p.14. FEATURE • A new Trend? Trend Micro Devices PC-cillin has been ‘In the Beginning was the Word…’ 14 completely revamped in recent years: our reviewer takes a PRODUCT REVIEWS look at the new DOS and Windows version on p.18. 1. PC-cillin 95 18 2. ViruSafe LAN 21 END NOTES & NEWS 24 VIRUS BULLETIN ©1996 Virus Bulletin Ltd, The Pentagon, Abingdon, Oxfordshire, OX14 3YP, England.
    [Show full text]
  • SUGI 25: Using Sasr Software and Visual Basic for Applications To
    Applications Development Paper 21-25 Using SAS® Software and Visual Basic for Applications to Automate Tasks in Microsoft Word: An Alternative to Dynamic Data Exchange Mark Stetz, Amgen, Inc., Thousand Oaks, CA ABSTRACT DDE AND THE HARRIS DESIGN Using Dynamic Data Exchange (DDE) to drive Microsoft While DDE implementation is simple, the mixture of SAS Office applications such as Word and Excel has long and WordBasic syntax can result in confusing, difficult to been a technique utilized by SAS programmers. While maintain code. The following shows a simple DATA step alternatives exist (e.g., generating RTF code, OLE for populating a Word document using DDE and Automation), the use of DDE in conjunction with the native WordBasic (assuming Word is currently running): scripting languages of these applications has been appealing since implementation is simple and the macro filename cmds dde 'winword|system' ; recording capabilities of Office applications make script generation nearly automatic. Harris (SUGI 24 data _null_ ; Proceedings, 1999) described a particularly elegant file cmds ; design for using the SAS System and DDE to populate Microsoft Word documents. put '[Insert "Hello World"]' ; put '[FileSaveAs ' Now that the more sophisticated Visual Basic for '.Name = "c:\My Documents\Hello", ' Applications (VBA) is the common development '.Format = 0, ' environment among all Office applications, however, DDE '.AddToMru=0]' ; only works with Office application legacy macro put '[FileClose]' ; languages. Employing Harris’ design, this paper run ; describes a technique to simulate the ease of use of the DDE methodology while taking full advantage of VBA to Harris suggested a design to simplify the coding of such automate Microsoft Word.
    [Show full text]
  • Zip Archive Download for Free Winrar Zip Archive Software
    zip archive download for free Winrar Zip Archive Software. ZIP Repair Toolbox is a state of the art recovery solution for WinZIP archive repair. Repair all ZIP archive type with ease, including repairing files with incorrect CRC values and enjoy previews and selective restore of recovered data Download now! File Name: ZipRepairToolboxInstall.exe Author: Repair Toolbox, Inc. License: Shareware ($27.00) File Size: 2.86 Mb Runs on: WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, WinServer, Windows Vista, Win98, WinNT 4.x, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005. WinRAR (x64) is a 64-bit Windows version of RAR Archiver, the powerful archiver and archive manager. WinRARs main features are very strong general and multimedia compression, solid compression, archive protection from damage, processing of ZIP and. File Name: winrar-x64-400.exe Author: RARLAB License: Shareware ($29.00) File Size: 1.5 Mb Runs on: Win7 x64, WinVista x64. Powerful archiver and archive manager. RAR files can usually compress content 8 to 30 percent better than ZIP files. Main features are strong compression, strong AES encryption, archive protection from damage, self-extracting archives and more. File Name: wrar550.exe Author: RARLAB License: Shareware ($34.83) File Size: 1.9 Mb Runs on: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64. ZIP Repair Software is designed for fixing and processing of corrupt or unusable ZIP archive files that are partially damaged or not completely downloaded. Zip File Recovery Zip Recovery Software supports all Windows versions, including Windows®.
    [Show full text]
  • Answers to Selected Problems
    Answers to selected problems Chapter 4 1 Whenever you need to find out information about a command, you should use man. With option -k followed by a keyword, man will display commands related to that keyword. In this case, a suitable keyword would be login, and the dialogue would look like: $ man -k login ... logname (1) - print user’s login name ... The correct answer is therefore logname.Tryit: $ logname chris 3 As in problem 4.1, you should use man to find out more information on date. In this case, however, you need specific information on date, so the command you use is $ man date The manual page for date is likely to be big, but this is not a problem. Remember that the manual page is divided into sections. First of all, notice that under section SYNOPSIS the possible format for arguments to date is given: NOTE SYNOPSIS date [-u] [+format] The POSIX standard specifies only two This indicates that date may have up to two arguments, both of arguments to date – which are optional (to show this, they are enclosed in square some systems may in brackets). The second one is preceded by a + symbol, and if you addition allow others read further down, in the DESCRIPTION section it describes what format can contain. This is a string (so enclose it in quotes) which 278 Answers to selected problems includes field descriptors to specify exactly what the output of date should look like. The field descriptors which are relevant are: %r (12-hour clock time), %A (weekday name), %d (day of week), %B (month name) and %Y (year).
    [Show full text]