VIRUS? HIDDEN ALL OF MY FILES AND MY FOLDER??? OR DELETE??

XTECHNOLOGY NETWORK CORPORATION. 2010 (Ltd.)
xtechnologies@gmx.com

Go to your home desktop. ( Administrator )

 Go to Menu bar, choose "Tools" & click at Folder Options.


 On the Folder Option Box, Click at View.

To unhide any folder and any file in your system,
makesure You choose "Show Hidden file and folder".
Then if you want to hide it back,
choose "Do not show hidden file and folder".
Then just click Apply and Ok.
Quick Simple Easy.

Add by Xtechnology Admin.
12:09 AM Sunday 3rd Oct 2010.

Panda USB Vaccine 1.0.1.4

Panda USB Vaccine 1.0.1.4
Helps prevent malware infections due to the autorun feature of Windows Operating Systems.
By Xtechnology Network Server. 2010.




xtechnology@gmx.com

McAfee AVERT Stinger 10.1.0.1056

McAfee AVERT Stinger 10.1.0.1056

New System Security. Platform support like Windows.
( Windows 7 Tested )


for more information, email us.
xtechnologies@gmx.com for user support.

Xtechnology Improving Technology In Networking.

2010 Become new Level of Network Structure.

  • Creative
  • Incorporate
  • Stable
  • Faster 
Enjoy your moment!
BLACK SCREEN
by
Xtechnology Network Server "Since (2007 - 2010)"
xtechnologies@gmx.com

Autorun Eater 2.5: Free Download

DOWNLOAD AUTORUN EATER 
VERSION 2.5.0.0 Now!



( Add by Fendy@Xtechnology.com for HACK-XXX.BLOGSPOT.COM )

Click Here to start Download

Download Autorun Virus Remover Version 2.3.0.0

Autorun Virus Remover  V2.3(Jan 06, 2010)
 
   
 Awards:
100% protection against any threats via USB drive
Remove autorun virus in the infected system
The best solution to protect offline computer
The world's fastest and smallest antivirus software
100% compatible with other antivirus software
Pay once and get it all (All Updates FREE)
Easy to use
 
   
  
       

System Application Controller

SYSTEM APPLICATION CONTROLLER

- Win32. Win.ini Win.logon Win.exe -

Specialist for Microsoft Windows 98 - 2000 - Me - Xp

Standard setup.exe application + more efficient!

UnTrusted Application ( Run as Administrator ! )




Be our member now! 
email : xtechnologies@gmx.com

HACK-XXX.BLOGSPOT.COM

Hacker X Professional ( Application #2 )

The Hacker X professional software

( Application #2 Tool and removal )

  • Quick Setup
  • Quick Grab
  • Quick Copy ( Moving autorun and transfer data )
  • Quick used

The Top One Hacker Software 2008 - 2009

HACKER SOFTWARE 2008 - 2009

the top one...


Anti Spyware Terminated

TERMINATED!!!!!!


SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional PC Security Scanning and Process Interrogation Technology will detect spyware other products miss! Easily remove pests such as WinFixer, SpyAxe, SpyFalcon, and thousands more! Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System. Our Dedicated Threat Research Team scours the web for new threats and provides daily definition updates.

"No1Knows" 


http://hack.xxx.blogspot.com/  05 05 2010 "1:13 am "

cmd.exe 2

CMD.EXE

Second Chapter
by Fendyz


HACK-XXX.BLOGSPOT.COM

cmd.exe 1

CMD.EXE

by Fendyz


Xtreme.dll - Streaming.dll

DotNet. NetFramework. Microsoft Corp.


The Hacker Attitude

The Hacker Attitude.........................

 

 ???????????????????????

????????????????????

???????????????

?????????

???????????????

????????????????????

???????????????????????


Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.
But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you'll miss the point. Becoming the kind of person who believes these things is important for you — for helping you learn and keeping you motivated. As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters — not just intellectually but emotionally as well.

How To Become A Hacker?

How??? How??? How??? How??? How???
   

What Is a Hacker?

 

contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits. If you want to know how to become a hacker, though, only two are really relevant.There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker.
The hacker mind-set is not confined to this software-hacker culture. There are people who apply the hacker attitude to other things, like electronics or music — actually, you can find it at the highest levels of any science or art. Software hackers recognize these kindred spirits elsewhere and may call them ‘hackers’ too — and some claim that the hacker nature is really independent of the particular medium the hacker works in. But in the rest of this document we will focus on the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker’.
There is another group of people who loudly call themselves hackers, but aren't. These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.


                                 http://hack-xxx.blogspot.com/

Autorun Processing Incomplete

how to make a autorun which automaticallty loads a file from a disc [autorun] open=myprogram.exe icon=myicon.ico

By Fendyz@Xtechnology

- 18 April 2010 -

Blue Screen??????


VirusList.Com Untrusted??????


Black Screen Solution

EXTREME HACKER 

- 2010 -

- CRASH -

- SYSTEM32 -

- CMD.EXE -

add by

Fendyz-Hacking Tournament Centre