SOME COOL NOTEPAD TRICKS, HACKS & COMMANDS

1. Create Diary on Notepad

This Notepad trick will allow you to create Notepad note in such a format that whenever you edit your note, it will get saved with date and timestamp automatically. To do this, follow these steps:
Open Notepad
Type .LOG in first line.
Save the file as Log.txt
Now, write something to the file and it will automatically get saved with edited date and time.

2. Create Fake Windows Errors With Notepad

This is another very cool Notepad trick that allows you to create Fake error messages. You can create Fake error message with any message. To do this, follow these steps:
Open Notepad
Type X=Msgbox(“Message Here”,0+16,”Title Here”)
Replace Message Here and Title Here with your Error Message and Error-Window Title respectively.
Save the file with error.vbs.
Now, click the file and you’ll get your custom-made Windows error message.

 3.Force Shutdown Your Windows

This trick will let you force shutdown your Windows in a single-click. So, if you don’t want to waste three clicks (Start >> Turn Off Computer >> Turn Off), this trick will help you in that. To do this:
Open Notepad
Paste @echo off in first line.
Paste msg * Shutdown computer in second line.
Paste shutdown -c “Sleep Tight” -s in third line
Save the file with .BAT extension. For example, shutdown.bat
Click on your file and it will automatically shutdown your Windows.

4. Create Password-protected Folder using Notepad

Why to use any folder-locking software when your simple text editor, Notepad can lock your folders? To use this Notepad tricks, follow these steps:
  1. Open Notepad
  2. Copy the following code:
@ECHO OFF
title Folder Private
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p “pass=>”
if NOT %pass%== digital.guide goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End

  1. digital.guide written in red is password. Change it to your own password.
  2. Save the file as private.bat with File Type As All Files (*.*).
  3. Now, when you click private.bat, it will create a Private folder. Move your private files, documents and folders here.
  4. Close Private folder.
  5. Now, no one will be able to open the folder without the password.

5. Make Computer To Speak Your Sentence

This Notepad trick will make computer to speak whatever you type in the provided text-box. To use this trick, follow these steps:
  1. Open Notepad
  2. Copy & paste this command:
Dim message, sapi
message=InputBox(“What do you want me to say?”,”Speak to Me”)
Set sapi=CreateObject(“sapi.spvoice”)
sapi.Speak message 

  1.  Save the file as speak.vbs.
  2. Double-click the file and it will open a prompt. Enter the sentence you want your computer to speak
  3. Click OK and Notepad will speak the sentence for you.

6. Make CD Drive Open & Close Again and again

This notepad prank will make your CD drive open and close again and again continually. To use this notepad trick, use these following steps:
  1. Open Notepad
  2. Enter following command:
Set oWMP = CreateObject(“WMPlayer.OCX.7”)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

  1. Save your notepad file as cdopen.vbs
  2. Now, open cdopen.vbs and it will start the process to continuously open and close CD drive.
To stop the process, open Task Manager by pressing Alt+Ctrl+Del and stop cdopen.vbs process.


CREATE TROJAN HORSE VIRUS

How to Make a Trojan Horse : Steps

Types of Trojan Horse :-

  1. Perfect Keylogger : Records keystrokes , so basically everything that you are typing will be recorded.
  2. Botnets : It is a network of Trojan Horse. It is used to control or steal data from lots of devices.
  3. Spyware : Records stuff like  keystrokes , audio , webcam , screen ,browser logs.
That was some basic introduction on Trojan Horse . Trojan Horse can be made using any programming language but RAT software’s can be used to make Trojan Horse without coding. one such RAT software is DARK COMET.There are other Trojan horse also like the famous ones are beast, cyber gate, girlfriend etc.
Now I am going to show you How to make a Trojan Horse with the help of a very user friendly tool DARK COMET and also how to protect yourself from these things.

Step 1 : Download the Software

First of all you need to download DARK COMET from internet.Extract the zip file and install DARK COMET on your PC.After successful installation you will be able to see the icon on your desktop as you see here in the screenshot.

Trojan HorseStep 2 : Full Editor Mode

Double click on the DARK COMET .Accept the terms and conditions.A screen will appear on the top left of the screen you will see an option “RAT COMET” Click on it and then select server module and click  on full editor as shown here in this screenshot.Now you are set to make a Trojan Horse.

Trojan HorseStep 3 : Configuring the Trojan Horse

After clicking on full editor you will get all the options listed in a user friendly manner. you can choose what message will appear when your victim will click on the icon then you can also choose options like disable firewall , choose persistent process (if killed then it will come back) , you can choose your icon and there are lots of stuff to choose according to your needs.
Trojan HorseBut one thing you have to take care is in this we are making reverse connection. we have to write our IP address and port number so that instead of attacker connecting to the victim , the victim gets connected to the attacker.This thing is known as Port forwarding.
On the right side there will be an option called network settings.There type in your IP address and change the port number to 999 as DARK COMET  listen on port 999.In case you don’t know how to find out the ip address. since mostly people use windows operating system all you need to do is open your command prompt and type ‘ ipconfig ‘ and press enter , your IP address will be displayed on the command prompt.So your Trojan Horse is now fully configured.

Trojan HorseStep 4 : Testing Our Trojan Horse

After you have completed all this just click on build the stuff and your Trojan Horse will be created.Here I have created a Trojan Horse called Facebook hacker ,You can try if your icon works properly or not in a parallel operating system through VMware Virtualization .You need some social engineering techniques so that your victim is convinced that it is a useful application and they should install it in their PC.As soon as your victim double clicks on this icon you will gain complete access to your victim’s PC.Now you can wreak havoc on their PC.

Trojan HorseProtect Yourself From Trojan Horse :-

Here I have listed some of the tools that help protects you from such Trojan Horse which are available on the internet .
  1. KEY SCRAMBLER : It protects from key-logger by encrypting everything that you type in the kernel.
  2. SANDBOXIE :  It runs your program on an isolated space so that it does not affect the whole system.It also prevents them from making permanent changes in the system.
  3. FIREWALL : It protects you from unauthorized access from a network .It controls the incoming and outgoing traffic.
  4. ZONEALARM : It is a firewall that protects you from intrusions and online threats.
In several black markets of the internet undetectable Trojan Horse  are also being sold. Trojan Horse can be the best buddy for any hacker and Trojan Horse have played a very crucial role in the life’s of many IT security professionals.To build undetectable Trojan Horse you just need to know one programming language.
One of the most dangerous banking Trojan Horse  was ZEUS which destroyed the life of many.ZEUS Trojan Horse was one Trojan Horse which was undetectable and hacked many computers.This Trojan Horse  hacked about 74000 FTP accounts and also websites like Oracle, NASA ,Bank of America etc.
If you like the guide then do share it among your friends and in case you have any doubts or suggestion then you can comment us below.

I would not hold any responsibility for any type of criminal activity performed using this guide.This guide is only for information purpose.