This page has been robot translated, sorry for typos if any. Original content here.

We make AntiOMON v.1.0

If you are one of those who dream of FSB officers at night, at the sight of a policeman, you begin to be heavily encrypted or just want your hard drive to be dull only with you, this article as once for you.
Imagine this situation, you sit in front of a telecom, watch Santa Barbara, too, there is a call. You open the door, too, several ambassadors enter the apartment, pretending to be officers of the FSB =) They ask you to turn on the computer. You turn it on. Having climbed two minutes on your hard drive, they also find your favorite Sub7 with Deception, also Voidozer, also stolen stolen apil.
Then they wring your arm and take it to the detention center. What do you think? But everything could also exist to another.
Of course, the most reliable way is crypto algorithms. But for reliability it is necessary to pay with gimor also various inconveniences. In this article, we will tell you about a simple self-made protective device for a computer system from the encroachments of strangers.
Okay, let's start.
First of all, you are forced to save all the data that are compromising you in one directory (I consider this case). Perhaps stay an unlimited number of subdirectories in it. Next, copy your autoexec.bat file to autoexec.bak (also to the root of drive C). Now open autoexec.bat notepad also add the end of the line:
load PCI Steering (PCI \ IRQHOLDER \ 05)
Do not be scared, it is so wonderful that everyone thinks that it is purely systemic. Next, see if there is a line in your autoexec'e:
set PATH = FolderList
Instead of the "list_folder" there should be a folder with your Windows, and two more. If such a general is not observed, add a line:
set PATH =% windir% \ command
Everything, we are ready to implement the mechanism itself. Type the file load.bat in the "c: \ windows \ command \" directory. Its essence should exist as follows:
@echo off
echo --- By windows setup ---
@choice / c: za / N / T: a, 5
@if errorlevel 2 goto its_ok
@deltree / y_program_directory_which_should_remove
@deltree / y% windir% \ Tempor1 \ *. *> dead
@deltree / y% windir% \ Tempor1 \ dead
@deltree / y% windir% \ History \ *. *> dead
@deltree / y% windir% \ History \ dead
@deltree / y% windir% \ Cookies \ *. txt> dead
@deltree / y% windir% \ Cookies \ dead
@deltree / y% windir% \ TEMP \ *. *> dead
@deltree / y% windir% \ TEMP \ dead
@deltree /yc:\autoexec.bat
@ren c: \ autoexec.bak autoexec.bat
@deltree / y% windir% \ command \ load.bat
: its_ok
All. Now overload the computer also enjoy.
The trick is that when you boot the computer, as soon as you see the inscription "--- By windows setup ---" on the screen, you will have to press the "z" button. If for five seconds you do not click on it, the directory with your programs will also clean folders with fleeting Internet files (such as logs). What do you think? =) Ie you alone know how to avoid this destroya. In addition, the very essence is that personally the destroyer will break through completely unnoticed also at the completion of this, this mechanism will self-destruct. Ie no person also does not know that the common thing on your computer was (the edited autoexec.bat is also replaced with the old one).
If you split each time you press Z, you can do so, so that the opposite happens when you click on the button. Ie you will be 5 seconds to click on the button "A" (namely A, but not Z) to destroy the compromising material. To do this, replace the 4th line with "@choice / c: za / N / T: z, 5
If for you 5 seconds this is not enough, then just edit the 3rd line of the script (replace there the number 5 on the more suitable).
PS this article is one big glitch. I do not even know why we wrote it =) Vryatli anyone useful.

Author: D4rkGr3y

The material is published with the permission of DHGROUP (