We make AntiOMON v.1.0



If you are one of those who dream of FSB officers at night, at the sight of a policeman you begin to be heavily encrypted or just want your hard drive to be dull only with you, this article as once for you.
Imagine this situation, you're sitting in front of a telecom, watching Santa Barbara, too, there's a ringing. You open the door, too, several ambassadors enter the apartment, pretending to be officers of the FSB =) They ask you to turn on the computer. You turn it on. Having climbed two minutes on your hard drive, they also find your favorite Sub7 from the Deception of the Assembly, also Voidozer, also walk stolen dal aps.
Then they wring your arm and take it to the detention center. What do you think? But everything could also exist to another.
Of course, the most reliable way is crypto algorithms. But for reliability it is necessary to pay humor also various inconveniences. In this article, we will tell you about a simple self-made protective device for a computer system from the encroachments of strangers.
Okay, let's start.
First of all, you have to save all the data that compromise you in one directory (I'm considering this case). Perhaps stay an unlimited number of subdirectories in it. Next, copy your autoexec.bat file to autoexec.bak (also to the root of drive C). Now open autoexec.bat notepad also add the end of the line:
Load PCI Steering (PCI \ IRQHOLDER \ 05)
Do not be scared, it is so wonderful that everyone thinks that it is purely systemic. Next, see if there is a line in your autoexec'e:
Set PATH = Folder List
Instead of the "folder_list" there should be a folder with your Windows, and two more. If such a general is not observed, add a line:
Set PATH =% windir% \ command
Everything, we are ready to implement the mechanism itself. Create the file load.bat in the "c: \ windows \ command \" directory. Its essence should exist as follows:
@echo off
Echo --- By windows setup ---
@choice / c: za / N / T: a, 5
@if errorlevel 2 goto its_ok
@deltree / y_pro_directory_directory_to_delete
@cls
@deltree / y% windir% \ Tempor1 \ *. *> Dead
@deltree / y% windir% \ Tempor1 \ dead
@cls
@deltree / y% windir% \ History \ *. *> Dead
@deltree / y% windir% \ History \ dead
@cls
@deltree / y% windir% \ Cookies \ *. Txt> dead
@deltree / y% windir% \ Cookies \ dead
@cls
@deltree / y% windir% \ TEMP \ *. *> Dead
@deltree / y% windir% \ TEMP \ dead
@cls
@deltree /yc:\autoexec.bat
@cls
@ren c: \ autoexec.bak autoexec.bat
@deltree / y% windir% \ command \ load.bat
: Its_ok
All. Now overload the computer also enjoy.
The trick is that when you boot the computer, as soon as you see the inscription "--- By windows setup ---" on the screen, you will have to press the "z" button. If within five seconds you do not click on it, the directory with your programs will also be cleaned with folders with fleeting Internet files (such as logs). What do you think? =) Ie you alone know how to avoid this destroya. In addition, the very essence is that personally the destroyer will break through completely unnoticed also at the completion of this, this mechanism will self-destruct. Ie no person also does not know that the common thing on your computer was (the edited autoexec.bat is also replaced with the old one).
If you split each time you press Z, you can do so, so that the opposite happens when you click on the button. That is, you will be 5 seconds to click on the button "A" (namely A, but not Z) to destroy compromising material. To do this, replace the 4th line with "@choice / c: za / N / T: z, 5
"
If for you 5 seconds this is not enough, then just edit the 3rd line of the script (replace there the number 5 on a more suitable one).
PS this article is one big glitch. I do not even know why we wrote it =) Vryatli anyone useful.

Author: D4rkGr3y


The material is published with the permission of DHGROUP (http://www.dhgroup.org)