Judul : DNS POISONING USING BATCH FILE PART-3
link : DNS POISONING USING BATCH FILE PART-3
DNS POISONING USING BATCH FILE PART-3
![]() |
| DNS POISONING USING BATCH FILE PART-3 |
Most of them have heard about the word ‘fork()’, which is used to create child process, like wise fork bombing is nothing but calling a program by itself again and again with a infinite loop and making the system to crash by popping up hundreds of windows on the screen.
@echo off
:loop
Explorer
Call fork.bat
Goto loop
Copy the above program and paste it in a notepad file and save it as ‘fork.bat’. The explorer command will open up the ‘documents’ directory, and it is given inside a loop, then the same batch file is called again which in turn opens up multiple documents rolled out in a loop, likewise it goes on by calling the program itself again and again until the system crashes or hangs up.
Demikianlah Artikel DNS POISONING USING BATCH FILE PART-3
Sekianlah artikel DNS POISONING USING BATCH FILE PART-3 kali ini, mudah-mudahan bisa memberi manfaat untuk anda semua. baiklah, sampai jumpa di postingan artikel lainnya.
Anda sekarang membaca artikel DNS POISONING USING BATCH FILE PART-3 dengan alamat link https://codecrot.blogspot.com/2016/06/dns-poisoning-using-batch-file-part-3.html

0 Response to "DNS POISONING USING BATCH FILE PART-3"
- Commented politely and wisely in accordance with the content.
- Comments are not needed by other readers [spam] will be removed immediately.
- If the article entitled "DNS POISONING USING BATCH FILE PART-3" is useful, share to social networks.
Code Conversion