SlideShare a Scribd company logo
1
By Shaharyar Khan
shaharyar.khan555@gmail.com
 Computer viruses are small software programs that are
designed to spread from one computer to another and to
interfere with computer operation.
 The term "virus" is also commonly, but erroneously, used to
refer to other types of malware, including but not limited to
adware and spyware programs that do not have a
reproductive ability.
2
shaharyar.khan555@gmail.com
 Brain is the industry standard name for a computer virus
that was released in its first form in January 1986
 It is considered to be the first computer virus for MS-DOS. It
infects the boot sector of storage media formatted with the
DOS File Allocation Table (FAT) file system
 Brain was written by two brothers, Basit Farooq Alvi and
Amjad Farooq Alvi from Lahore, Pakistan
3
shaharyar.khan555@gmail.com
 Malware includes computer viruses, computer worms,
ransomware, trojan horses, keyloggers, most rootkits,
spyware, dishonest adware, malicious BHOs and other
malicious software
 The majority of active malware threats are usually trojans or
worms rather than viruses
4
shaharyar.khan555@gmail.com
Some most common electronic infections are:
Viruses: A virus is a small piece of software that piggybacks
on real programs. For example, a virus might attach itself to a
program such as a spreadsheet program. Each time the
spreadsheet program runs, the virus runs, too, and it has the
chance to reproduce (by attaching to other programs) or wreak
havoc.
E-mail viruses: An e-mail virus travels as an attachment to e-
mail messages, and usually replicates itself by automatically
mailing itself to dozens of people in the victim's e-mail address
book. Some e-mail viruses don't even require a double-click --
they launch when you view the infected message in the
preview pane of your e-mail software
5
shaharyar.khan555@gmail.com
 Trojan horses: A Trojan horse is simply a computer
program. The program claims to do one thing (it may claim
to be a game) but instead does damage when you run it (it
may erase your hard disk). Trojan horses have no way to
replicate automatically.
 Worms: A worm is a small piece of software that uses
computer networks and security holes to replicate itself. A
copy of the worm scans the network for another machine
that has a specific security hole. It copies itself to the new
machine using the security hole, and then starts replicating
from there, as well.
6
shaharyar.khan555@gmail.com
 Malware such as trojan horses and worms is sometimes
confused with viruses, which are technically different
 a worm can exploit security vulnerabilities to spread itself
automatically to other computers through networks, while a
trojan horse is a program that appears harmless but hides
malicious functions. Worms and trojan horses, like viruses,
may harm a computer system's data or performance.
7
shaharyar.khan555@gmail.com
 Here now I will create a fake virus in Java for demo
 For creating this demo , you need to install jdk , jre and any
java editor like eclipse or netbeans
 Even you can write this in notepad and compile it from
command propmt
 Let have some fun 
8
shaharyar.khan555@gmail.com
 Robot class gives us functionality to control over mouse.
 I will create a virus in which a mouse can get mad :p
 Robot class have a function mouseMove(x,y) which needs x
and y location (screen coordinates) and then it move the
mouse at that location.
 We will just write a infinite loop which will continuously
changes the location of mouse and our control on mouse will
not remain
9
shaharyar.khan555@gmail.com
 Here is the function
public void mentalMouse() throws Exception{
Robot r = new Robot();
Random randomGenerator = new Random();
Random randomGenerator1 = new Random();
for(double a=0;a<100000;a++){
int x = randomGenerator.nextInt(1000);
int y = randomGenerator1.nextInt(1000);
r.mouseMove(x,y);
}
I limit this loop to 100000, so it get stop after few seconds. If you
are naughty enough then You can replace this by while(1)
:D :D :D 10
shaharyar.khan555@gmail.com
 In that function
I have created a Robot class object
Then generate two random numbers
And then set the location of the mouse with these two
numbers by r.mouseMove(x,y);
 In next slide you will find the whole class
11
shaharyar.khan555@gmail.com
12
shaharyar.khan555@gmail.com
import java.awt.Robot;
import java.util.Random;
public class Ewien {
public void mentalMouse() throws Exception {
Robot r = new Robot();
Random randomGenerator = new Random();
Random randomGenerator1 = new Random();
for (double a = 0; a < 100000; a++) {
int x = randomGenerator.nextInt(1000);
int y = randomGenerator1.nextInt(1000);
r.mouseMove(x, y);
}
}
public static void main(String[] args) {
try {
new Ewien().mentalMouse();
} catch (Exception e) {
e.printStackTrace();
}
}
}
13

More Related Content

Viewers also liked

J2ee
J2eeJ2ee
Computer IT jokes part 4
Computer IT jokes part 4Computer IT jokes part 4
Computer IT jokes part 4
Laurence Svekis
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

Viewers also liked (6)

J2ee
J2eeJ2ee
J2ee
 
Computer IT jokes part 4
Computer IT jokes part 4Computer IT jokes part 4
Computer IT jokes part 4
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Computer virus

Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
NORTHCUSTOMS
 
Computer Security
Computer SecurityComputer Security
Computer Security
William Mann
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
NamanKikani
 
V!R0L0gy - Malwares vs Glitch Art
V!R0L0gy - Malwares vs Glitch ArtV!R0L0gy - Malwares vs Glitch Art
V!R0L0gy - Malwares vs Glitch Art
Domenico Barra
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
Robin Garza
 
Viruses
VirusesViruses
virus
virusvirus
Presentation
PresentationPresentation
Presentation
Nishant Barot
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
Ammar Hasayen
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
Osama Yousaf
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
IT Department Akre
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
Softex Software House
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
adni_shadah
 

Similar to Computer virus (20)

Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
V!R0L0gy - Malwares vs Glitch Art
V!R0L0gy - Malwares vs Glitch ArtV!R0L0gy - Malwares vs Glitch Art
V!R0L0gy - Malwares vs Glitch Art
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Viruses
VirusesViruses
Viruses
 
virus
virusvirus
virus
 
Presentation
PresentationPresentation
Presentation
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Malware
MalwareMalware
Malware
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Computer virus

  • 2.  Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. 2 shaharyar.khan555@gmail.com
  • 3.  Brain is the industry standard name for a computer virus that was released in its first form in January 1986  It is considered to be the first computer virus for MS-DOS. It infects the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system  Brain was written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi from Lahore, Pakistan 3 shaharyar.khan555@gmail.com
  • 4.  Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software  The majority of active malware threats are usually trojans or worms rather than viruses 4 shaharyar.khan555@gmail.com
  • 5. Some most common electronic infections are: Viruses: A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. E-mail viruses: An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software 5 shaharyar.khan555@gmail.com
  • 6.  Trojan horses: A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.  Worms: A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. 6 shaharyar.khan555@gmail.com
  • 7.  Malware such as trojan horses and worms is sometimes confused with viruses, which are technically different  a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a trojan horse is a program that appears harmless but hides malicious functions. Worms and trojan horses, like viruses, may harm a computer system's data or performance. 7 shaharyar.khan555@gmail.com
  • 8.  Here now I will create a fake virus in Java for demo  For creating this demo , you need to install jdk , jre and any java editor like eclipse or netbeans  Even you can write this in notepad and compile it from command propmt  Let have some fun  8 shaharyar.khan555@gmail.com
  • 9.  Robot class gives us functionality to control over mouse.  I will create a virus in which a mouse can get mad :p  Robot class have a function mouseMove(x,y) which needs x and y location (screen coordinates) and then it move the mouse at that location.  We will just write a infinite loop which will continuously changes the location of mouse and our control on mouse will not remain 9 shaharyar.khan555@gmail.com
  • 10.  Here is the function public void mentalMouse() throws Exception{ Robot r = new Robot(); Random randomGenerator = new Random(); Random randomGenerator1 = new Random(); for(double a=0;a<100000;a++){ int x = randomGenerator.nextInt(1000); int y = randomGenerator1.nextInt(1000); r.mouseMove(x,y); } I limit this loop to 100000, so it get stop after few seconds. If you are naughty enough then You can replace this by while(1) :D :D :D 10 shaharyar.khan555@gmail.com
  • 11.  In that function I have created a Robot class object Then generate two random numbers And then set the location of the mouse with these two numbers by r.mouseMove(x,y);  In next slide you will find the whole class 11 shaharyar.khan555@gmail.com
  • 12. 12 shaharyar.khan555@gmail.com import java.awt.Robot; import java.util.Random; public class Ewien { public void mentalMouse() throws Exception { Robot r = new Robot(); Random randomGenerator = new Random(); Random randomGenerator1 = new Random(); for (double a = 0; a < 100000; a++) { int x = randomGenerator.nextInt(1000); int y = randomGenerator1.nextInt(1000); r.mouseMove(x, y); } } public static void main(String[] args) { try { new Ewien().mentalMouse(); } catch (Exception e) { e.printStackTrace(); } } }
  • 13. 13