How to protect your files with a password

File protection software

file protection software
In this article i am going to show you how you can protect your files using password.As we know that there are various types of folder protection software which can protect your files but a limited period of time.If someone get a folder lock software with unlimited time then maximum these types of software's includes virus.I know it very well because i have experienced it.

So i am going to teach you a very easy steps to protect your folders and files with password.
Step 1:
 open notepad from your computer.
Step 2:
 copy the code which is given below and paste it to notepad.



Quote: cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDENTER PASSWORD TO OPEN
:CONFIRM
echo .........................................................
echo ........................................ Www.minitipsandtricks.blogspot.com .........................................
echo..............................................................................
echo Are you sure you want to lock the folder(Y/N)
echo Press (Y) for Yes and Press (N) for No.
echo...........................................................................
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo ..................................................................
echo ................................................ Www.minitipsandtricks.blogspot.com ........................................
echo ......................................................................
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== YOUR PASSWORD goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDENTER PASSWORD TO OPEN
md Private
echo Private created successfully
goto End
:End
  


Step 3:
 Now save this file as "locker.bat".

Step 4:
Now open this file.

Step 5:
A folder will appear.

Step 6:
Place your personal files in this folder which you want to protect.

Step 7:
Now open the folder "locker" again and press "y" to protect folder.Your folder will be protected.

Step 8:
Enter a password for your folder.


Now every thing is done.Enjoy.


NOTE: This code works in only windows xp.

How to check email is original or not

How to check that Email is Fake original

There are many peoples who don't know which email is valid and which email is not.In this article I am going to show you how to check that email is valid or not.
check email is valid or not
First of all you need to learn how email works on internet.
check email is valid or not
 So Here The Sender i.e Mail User Agent 1 (MUA1) is sending a mail to Mail User Agent 2 (MUA2). So the sender will type the mail and click on send button and mail first send to Mail Transfer Agent (MTA)and then over the internet.And then another Mail Transfer Agent.Then MTA  send your mail on mail box and mail box send mail to Mail delivery Agent (MDA) and after all these steps mail reach to its destination.
That was the summery,how email travel over the Internet.

Now How to Send The Fake Mail.

To send fake mail We need to Bypass the abc@1server and 1server.com both and directly send an email over internet .

So for that we will use a .php script as php has a function mail(); which can send email to any one without the 1server.com and directly delivering the mail to 2server.in and then 2server.in will search for the xyz@2server.in in their own database and then the mail will be forwarded to xyz@2server.in and when the XYZ user login to their account they will see an email in their inbox which is from abc@1server.com.


<?php
$to                 = 'web123@demo.com' ;
$subject         = 'the subject ' ;
$message       = ' hello' ;
$headers        = 'from: web123@demo.com'    . "\r\n"   .
         'Reply-To: web123@demo.com'   . "\r\n"  .
         'X-Mailer:  PHP / '   .  phpversion();

mail($to,  $subject, $message,  $ headers);
?>



But actually the email is not sent by abc@server1.com to xyz@server2.in so it is a fake mail.

There are many websites who provide services of sending fake emails.
you just have to land on their page,fill form and send fake mail

how to check e-mail is valid or not

Now How can you check When you receive such mail.

Step 1:- First of all open the mail.


how to check e-mail is valid or not























Step 2:- Now Click on the downarrow near reply button and then click on show original button.

check email is valid or not


Now you have to check for the received from field on the page opened and see who has sent you the email , here billgates@microsoft.com is the sender so in the received from field check that there must be microsoft.comand not any other thing. this was fake mail as there is outgoing.hostingexample.com and so the mail is fake as there is no microsoftcompany.com here.

check email is valid or not
























Remember:

Do not send fake mails for criminal activities.Your IP address  can be tracked and your criminal activities.
So please do not try to destroy any one's account.This post is only for educational purpose.

What is key loggers



What is key logger

What is key logger:

keylogger is a software or hardware device which is use to moniter log each of the keys a user types form the keyboard to computer.In Key logger the only user who installed this program to computer can access it because it is password protected and user who install this program can only know about it.
Key loggers often use by employers to know that employes work for business purpose only. Unfortunately keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

what is key logger

About keyloggers:

A keylogger will reveal the contents of all e-mail composed by the user.A key logger normally consist of two files: DLL which does all the work and EXE file. So when you deploy the hooker on a system, there are 2 such files must be present in the same directory.

Other ways of capturing what you are doing:

Some key loggers captures screen rather than keys.
Some key loggers capture video or audio.

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a key loggers could be which boasts these features:

· Stealth: invisible in process list

· Includes kernel key logger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)


· Pro Bot program files & registry entries are hidden (Windows 2000 / XP)

· Includes Remote Deployment wizard

· Active windows title and process names logging

· Keystroke / password logging

· Regional keyboard support

· Keylogging in NT console windows

· Launched applications list

· Text snap shots of active applications.

· Visited Internet URL logger

· Capture HTTP POST data (including logins/passwords)
· File & Folder creation/removal logging
· Mouse activities
· Workstation user & time stamp recording

· Log file archiving, separate log files for each user

· Log file secure encryption

· Password authentication

· Invisible operation

· Native GUI session log presentation

· Easy log file reports include with Instant Viewer 2 Web interface

· HTML and Text log file export

· Automatic E-mail log file delivery

· Easy setup & uninstall wizards

· Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP

Now I am going to tell you about some famous key loggers.

1:Actual spy:
 
Download link here.

2:Golden key logger: 

Download link here.

3:Elite key logger:

Download link here.
4:Home key logger:

Download link here.