This is a place where you can learn interesting things about computer.
How to protect your files with a password
File protection software
In this article i am going to show you how you can protect your files using password.As we know that there are various types of folder protection software which can protect your files but a limited period of time.If someone get a folder lock software with unlimited time then maximum these types of software's includes virus.I know it very well because i have experienced it.
So i am going to teach you a very easy steps to protect your folders and files with password.
Step 1:
open notepad from your computer.
Step 2:
copy the code which is given below and paste it to notepad.
Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo .........................................................
echo ........................................ Www.minitipsandtricks.blogspot.com .........................................
echo..............................................................................
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo...........................................................................
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo ..................................................................
echo ................................................ Www.minitipsandtricks.blogspot.com ........................................
echo ......................................................................
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo .........................................................
echo ........................................ Www.minitipsandtricks.blogspot.com .........................................
echo..............................................................................
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo...........................................................................
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo ..................................................................
echo ................................................ Www.minitipsandtricks.blogspot.com ........................................
echo ......................................................................
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
Step 3:
Now save this file as "locker.bat".
Step 4:
Now open this file.
Step 5:
A folder will appear.
Step 6:
Place your personal files in this folder which you want to protect.
Step 7:
Now open the folder "locker" again and press "y" to protect folder.Your folder will be protected.
Step 8:
Enter a password for your folder.
Now every thing is done.Enjoy.
NOTE: This code works in only windows xp.
Step 4:
Now open this file.
Step 5:
A folder will appear.
Step 6:
Place your personal files in this folder which you want to protect.
Step 7:
Now open the folder "locker" again and press "y" to protect folder.Your folder will be protected.
Step 8:
Enter a password for your folder.
Now every thing is done.Enjoy.
NOTE: This code works in only windows xp.
How to check email is original or not
How to check that Email is Fake original
There are many peoples who don't know which email is valid and which email is not.In this article I am going to show you how to check that email is valid or not.
So Here The Sender i.e Mail User Agent 1 (MUA1) is sending a mail to Mail User Agent 2 (MUA2). So the sender will type the mail and click on send button and mail first send to Mail Transfer Agent (MTA)and then over the internet.And then another Mail Transfer Agent.Then MTA send your mail on mail box and mail box send mail to Mail delivery Agent (MDA) and after all these steps mail reach to its destination.
That was the summery,how email travel over the Internet.
Now How to Send The Fake Mail.
To send fake mail We need to Bypass the abc@1server and 1server.com both and directly send an email over internet .
So for that we will use a .php script as php has a function mail(); which can send email to any one without the 1server.com and directly delivering the mail to 2server.in and then 2server.in will search for the xyz@2server.in in their own database and then the mail will be forwarded to xyz@2server.in and when the XYZ user login to their account they will see an email in their inbox which is from abc@1server.com.
<?php
$to = 'web123@demo.com' ;
$subject = 'the subject ' ;
$message = ' hello' ;
$headers = 'from: web123@demo.com' . "\r\n" .
'Reply-To: web123@demo.com' . "\r\n" .
'X-Mailer: PHP / ' . phpversion();
mail($to, $subject, $message, $ headers);
?>
But actually the email is not sent by abc@server1.com to xyz@server2.in so it is a fake mail.
There are many websites who provide services of sending fake emails.
you just have to land on their page,fill form and send fake mail
Now How can you check When you receive such mail.
Step 1:- First of all open the mail.
Step 2:- Now Click on the downarrow near reply button and then click on show original button.
Now you have to check for the received from field on the page opened and see who has sent you the email , here billgates@microsoft.com is the sender so in the received from field check that there must be microsoft.comand not any other thing. this was fake mail as there is outgoing.hostingexample.com and so the mail is fake as there is no microsoftcompany.com here.
Remember:
Do not send fake mails for criminal activities.Your IP address can be tracked and your criminal activities.
So please do not try to destroy any one's account.This post is only for educational purpose.
What is key loggers
What is key logger
What is key logger:
keylogger is a software or hardware device which is use to moniter
log each of the keys a user types form the keyboard to computer.In Key logger the only user
who installed this program to computer can access it because it is password
protected and user who install this program can only know about it.
Key loggers often use by
employers to know that employes work for business purpose only. Unfortunately keyloggers can also be embedded in spyware allowing your
information to be transmitted to an unknown third party.
About keyloggers:
A keylogger
will reveal the contents of all e-mail composed by the user.A key logger
normally consist of two files: DLL which does all the work and EXE file. So when you deploy the hooker on
a system, there are 2 such files must be present in the same directory.
Other ways of capturing what you are doing:
Some key loggers captures screen rather than keys.
Some key loggers capture video or audio.
A
keyloggers might be as simple as an exe and a dll that are placed on a machine
and invoked at boot via an entry in the registry. Or a key loggers could be
which boasts these features:
· Stealth: invisible in process list
· Includes kernel key logger driver that captures keystrokes even when
user is logged off (Windows 2000 / XP)
· Pro Bot program files & registry entries are hidden (Windows 2000 /
XP)
· Includes Remote Deployment wizard
· Active windows title and process names logging
· Keystroke / password logging
· Regional keyboard support
· Keylogging in NT console windows
· Launched applications list
· Text snap shots of active applications.
· Visited Internet URL logger
· File & Folder
creation/removal logging
· Mouse
activities
· Workstation user & time stamp recording
· Log file archiving, separate log files for each user
· Log file secure encryption
· Password authentication
· Invisible operation
· Native GUI session log presentation
· Easy log file reports include with Instant Viewer 2 Web interface
· HTML and Text log file export
· Automatic E-mail log file delivery
· Easy setup & uninstall wizards
· Support for
Windows (R) 95/98/ME and Windows (R) NT/2000/XP
Now I am going to tell you about some
famous key loggers.
1:Actual spy:
Download link here.
2:Golden key logger:
Download link here.
3:Elite key logger:
Download link here.
Subscribe to:
Posts (Atom)