This is a place where you can learn interesting things about computer.
How to protect your files with a password
File protection software
In this article i am going to show you how you can protect your files using password.As we know that there are various types of folder protection software which can protect your files but a limited period of time.If someone get a folder lock software with unlimited time then maximum these types of software's includes virus.I know it very well because i have experienced it.
So i am going to teach you a very easy steps to protect your folders and files with password.
Step 1:
open notepad from your computer.
Step 2:
copy the code which is given below and paste it to notepad.
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo .........................................................
echo ........................................ Www.minitipsandtricks.blogspot.com .........................................
echo..............................................................................
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo...........................................................................
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo ..................................................................
echo ................................................ Www.minitipsandtricks.blogspot.com ........................................
echo ......................................................................
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo .........................................................
echo ........................................ Www.minitipsandtricks.blogspot.com .........................................
echo..............................................................................
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo...........................................................................
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo ..................................................................
echo ................................................ Www.minitipsandtricks.blogspot.com ........................................
echo ......................................................................
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
Step 3:
Now save this file as "locker.bat".
Step 4:
Now open this file.
Step 5:
A folder will appear.
Step 6:
Place your personal files in this folder which you want to protect.
Step 7:
Now open the folder "locker" again and press "y" to protect folder.Your folder will be protected.
Step 8:
Enter a password for your folder.
Now every thing is done.Enjoy.
NOTE: This code works in only windows xp.
Step 4:
Now open this file.
Step 5:
A folder will appear.
Step 6:
Place your personal files in this folder which you want to protect.
Step 7:
Now open the folder "locker" again and press "y" to protect folder.Your folder will be protected.
Step 8:
Enter a password for your folder.
Now every thing is done.Enjoy.
NOTE: This code works in only windows xp.
How to check email is original or not
How to check that Email is Fake original
There are many peoples who don't know which email is valid and which email is not.In this article I am going to show you how to check that email is valid or not.
So Here The Sender i.e Mail User Agent 1 (MUA1) is sending a mail to Mail User Agent 2 (MUA2). So the sender will type the mail and click on send button and mail first send to Mail Transfer Agent (MTA)and then over the internet.And then another Mail Transfer Agent.Then MTA send your mail on mail box and mail box send mail to Mail delivery Agent (MDA) and after all these steps mail reach to its destination.
That was the summery,how email travel over the Internet.
Now How to Send The Fake Mail.
To send fake mail We need to Bypass the abc@1server and 1server.com both and directly send an email over internet .
So for that we will use a .php script as php has a function mail(); which can send email to any one without the 1server.com and directly delivering the mail to 2server.in and then 2server.in will search for the xyz@2server.in in their own database and then the mail will be forwarded to xyz@2server.in and when the XYZ user login to their account they will see an email in their inbox which is from abc@1server.com.
<?php
$to = 'web123@demo.com' ;
$subject = 'the subject ' ;
$message = ' hello' ;
$headers = 'from: web123@demo.com' . "\r\n" .
'Reply-To: web123@demo.com' . "\r\n" .
'X-Mailer: PHP / ' . phpversion();
mail($to, $subject, $message, $ headers);
?>
But actually the email is not sent by abc@server1.com to xyz@server2.in so it is a fake mail.
There are many websites who provide services of sending fake emails.
you just have to land on their page,fill form and send fake mail
Now How can you check When you receive such mail.
Step 1:- First of all open the mail.
Step 2:- Now Click on the downarrow near reply button and then click on show original button.
Now you have to check for the received from field on the page opened and see who has sent you the email , here billgates@microsoft.com is the sender so in the received from field check that there must be microsoft.comand not any other thing. this was fake mail as there is outgoing.hostingexample.com and so the mail is fake as there is no microsoftcompany.com here.
Remember:
Do not send fake mails for criminal activities.Your IP address can be tracked and your criminal activities.
So please do not try to destroy any one's account.This post is only for educational purpose.
What is key loggers
What is key logger
What is key logger:
keylogger is a software or hardware device which is use to moniter
log each of the keys a user types form the keyboard to computer.In Key logger the only user
who installed this program to computer can access it because it is password
protected and user who install this program can only know about it.
Key loggers often use by
employers to know that employes work for business purpose only. Unfortunately keyloggers can also be embedded in spyware allowing your
information to be transmitted to an unknown third party.
About keyloggers:
A keylogger
will reveal the contents of all e-mail composed by the user.A key logger
normally consist of two files: DLL which does all the work and EXE file. So when you deploy the hooker on
a system, there are 2 such files must be present in the same directory.
Other ways of capturing what you are doing:
Some key loggers captures screen rather than keys.
Some key loggers capture video or audio.
A
keyloggers might be as simple as an exe and a dll that are placed on a machine
and invoked at boot via an entry in the registry. Or a key loggers could be
which boasts these features:
· Stealth: invisible in process list
· Includes kernel key logger driver that captures keystrokes even when
user is logged off (Windows 2000 / XP)
· Pro Bot program files & registry entries are hidden (Windows 2000 /
XP)
· Includes Remote Deployment wizard
· Active windows title and process names logging
· Keystroke / password logging
· Regional keyboard support
· Keylogging in NT console windows
· Launched applications list
· Text snap shots of active applications.
· Visited Internet URL logger
· File & Folder
creation/removal logging
· Mouse
activities
· Workstation user & time stamp recording
· Log file archiving, separate log files for each user
· Log file secure encryption
· Password authentication
· Invisible operation
· Native GUI session log presentation
· Easy log file reports include with Instant Viewer 2 Web interface
· HTML and Text log file export
· Automatic E-mail log file delivery
· Easy setup & uninstall wizards
· Support for
Windows (R) 95/98/ME and Windows (R) NT/2000/XP
Now I am going to tell you about some
famous key loggers.
1:Actual spy:
Download link here.
2:Golden key logger:
Download link here.
3:Elite key logger:
Download link here.
What is hacking
Complete concept of hacking
1: Concept of Ethical Hacking
Hacking:
Hacking is a art in which various security is breached.Computer hackers have been around for so many years since the internet uses widely in this world.Each day we hear more and more about hacking but only a few hackers we know like Kevin Mitnick,are well knows.
Every thing has two phases,one is positive and one is negative.Like this there is also good hackers & bad hackers.Good hackers who did good things are known as White Hat Hackers and the bad one's are known as Black Hat hackers.
It is difficult thing to recognize a hacker because they are like us but some general characteristics can help to understand them.Yes ,Not every hackers are Antisocial,Pimple-faced teenagers.Hackers are curious to know new things and test their limits and they are often sharp minded.
Hacker:
Hacker is a word that has two meanigs:
Traditionally a hacker is someone who likes to play with softwares and with Electronic Systems.They enjoys exploring and learning,how to operate computer with different ways.
Recently,Hacker has taken a new meaning ,someone who breaks into a system for his personal gain.Technically they are crackers and crackers are Criminals.
Hacking is a art which based on knowledge,skills and also will power.
Difference between Hackers & Crackers:
Definition - A Hacker is a person who is interested in computer Operating system. Mostly, Hackers are programmers. Hackers gain advanced knowledge of operating systems and programming languages. They know various security holes within systems and also the reasons for such holes. Hackers constantly seek more knowledge, share in which what they have discovered, and they never have any intentions about damaging or stealing data.They are good one's.
Definition - A Cracker is a person who breaks into other people systems, with is malicious intentions. Crackers gain unauthorized access, destroy others important data, also stop services provided by the server, or basically cause problems for their victims.Crackers can easily identified because their actions are malicious.
Types of Hackers
White hat hackers:
A white hat hackers are programmers who have a great amount of knowledge of programming.They perform Ethical Hacking.They uses their skills for good.They perform hacking for improvement of existing soft-wares.They also Known as Ethical hacker or a Penetration Tester.
Black hat hackers:
A black hat hackers are known as unethical hackers because they perform unethical hacking.They perform illegal steps for their personal benefit.They focus on security hacking and personal stuff hacking.
Grey hat hackers:
Grey hat hackers are type of hackers who act some time legal operations and some time illegal.They don't usually hack for personal gain.
They are hybrid between white & black hat hackers
How to reveal hidden password in web browsers
Reveal Hidden Password
In this article I am going to show you how to reveal password on web browsers.
Remember that when you enter password in password field on any web browser then it will be save somewhere in back end.Its just a matter of time when hackers figure it out where your password place.
For the security reasons password field in all browsers is masked with “asterisks” which won’t allow any third person (even you) to read the original typed password.
Reveal password behind asterisk and dots in different web browsers
For Chrome:
Go to any website where you can enter username and password.Enter your username in username filed eg(demo@gmail.com) and password in password field eg(password)then right click on password field,a file will appear.click on "Inspect element".A HTML code will appear.In that code search for "password" and replace it with "text"password will appear behind the asterisks.
For Mozilla Firefox:
Go to any website where you can enter username and password.Enter your
username eg(demo@gmail.com) and password in password
field eg(password)then right click on password field,a file will
appear.click on "Inspect element"A java-script code will appear.In that code replace "password" with "text"password behind asterisks will appear.
Add caption |
NOTE:
Delete "undelete able" file or folder
Delete an “Undeletable” File / Folder
We all Are familiar With such kind of ERROR in windows so how to Fix them.
Step 1:- Open a Command-Prompt window & leave it open.
Step 2- Close all open programs.
Step 3:- Click Start, Run and enter TASK-MGR.EXE
Step 4:- Go to the Processes tab and End Process on Explorer.exe.
Step 5:- Leave Task Manager open.
Step 6:- Go back to Command-Prompt window and change to the directory the AVI (or other undeletable file) is located in.
Step 7:- At the command prompt type DEL <file-name> where <file-name> is the file you wish to delete.
Step 8:- Go back to Task-Manager then click File then New Task and enter EXPLORER.EXE to restart GUI shell.
Step 9:- Close Task Manager.
Or you can try this
Step 1:- Open Notepad.exe
Step 2:-Click File>Save As..>
Step 3:-locate the folder where undeletable file is
Step 4:-Choose 'All files' from the file type box
Step 5:-click once on the file u want to delete so its name appears in the 'file-name' box
Step 6:-put a " at the start and end of the file-name
(the file-name should have extension of the undeletable file so it will overwrite it)
Step 7:-click save,
Step 8:-It should ask u to overwrite existing file, choose yes and u can delete it as normally.
Here's a manual way of doing it.
Step 1:- Start
Here's a manual way of doing it.
Step 1:- Start
Step 2:- Run
Step 3:- Type: command
Step 4:- To move into directory type: CD c:\*** (The stars stand for your folder)
Step 5:- If you cannot access the folder because it has spaces for example Program Files or Kazaa Lite folder you have to do the following. instead of typing in full folder name only take the first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1
Step 6:- Once your in folder then non-deletable file it in type in dir - a list will come up with everything inside.
Step 7:- Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: If your file-name was bad file.bmp you would type once in specific folder thorugh command, Del badfil~1.bmp and your file should be gone. Make sure to type in correct extension.
How to fix corrupted xp files
How to fix corrupted XP files
Fix XP files by following simple steps:
Requirement:
1: Windows xp cd.
Now follow these steps:
Step 1. Place the xp cd in your cd/dvd driveStep 2. Go to start
Step 3. Run
Step 4. Type sfc /scannow
Now sit back and relax, it should all load and fix all your corrupted file on win XP.I hope this method can fix your corrupted xp system files.
This method isn't useful thenyou need to format the Computer as there would be Viruses in the PC & you can can also use the antivirus if the Possible otherwise format the PC “.
How to activate windows 7
How to Activate Windows 7 & vista
Activate windows 7 & vista for free.
In this article i am going to show you how to activate windows 7 and made it genuine.
You just have to follow some simple steps :
Step 1 :
Right click on computer and select properties.This will open properties window.
Step 2 :
Click " Activate windows online " .
Step 3 :
Enter your windows product key here and click next.
Partition tool
AOMEI Partition Assistant
Create partition using AOMEI Partition Assistant.
Hi guys.Today i am going to show you how to create partition of your hard drive without formatting your window and without any window tool.
The tool I am going to use is AOMEI Partition Assistant.
For this purpose you just have to follow some simple steps.
Click here and download Aomei Partition Assistant.
For your better understanding I made a video tutorial.
Click button below to download video tutorial.
Trace mobile number
Trace mobile number
Trace mobile number in Pakistan
Mobile tracking refers to locate the current position of a mobile.But in this article i will guide you to locate mobile number city.
There are many directories you may know about PT-CL landlines.With the help of it we can know person address.Directory book was old fashion.I have got a software using it you can trace mobile number.
You can locate these networks.
Subscribe to:
Posts (Atom)