Sunday 8 June 2014

0

How to Login Multiple Skype Accounts at the same time..

Posted in ,

Step 1:Go to Skype installation path on your computer

Example: C:\Program Files\Skype\Phone

Step 2: Right Click on Skype.exe icon

Step 3:Select Send to –> Desktop(create shortcut)
Now it will create a Skype shortcut on your desktop

Step 4: Right Click on the Skype icon which you have newly created

Step 5: select Properties

Step 6:In target feild, at the end of the path give a space and followed by the text " /Secondary "

0 comments:

Wednesday 4 June 2014

0

How to change friend's profile pictures ?

Posted in , , ,
STEP 1 : Login with your facebook account.
STEP 2 : Select the friend whose profile picture you
want to change.
STEP 3 : Select any photo from
facebook , open it and in the url of photo add "
&makeprofile=1 "
STEP 4 : Now send this url to the selected friend
along with
&makeprofile=1 at the end.
That's it.
Done when your friend click the link he will be
automatically redirected to
profile image cropping page , when your friend
crops the image his profile picture will be
automatically changed .
Make sure that your friend crops the image.

0 comments:

Sunday 1 June 2014

0

How to Hack Victim PC Using BEAST TROJAN

Posted in ,
==========
NOTE:i'm nt responsible fr any damage
- download beast trojan google n install it
- unrar the pack
- Open The software you will get the screen
>>How to make a TROJAN using BEAST TROJAN :-
-----------------------------------------------------------------
1) Now Click on ” Build server ” button.
2) now click on notofication tab
3) In the notifications tab click on the e-mail button.
4) now fill ur proper email
5) Now Go to “AV-FW kill ” tab.
6) now put a tick mark on the ” disable XP firewall “.
7) Now Click on “EXE icon ” tab.
8) n now u can choose any icon for the file from the list or you
can browse the icon from the directory and can use it.
9) Now click on the ” Save Server ” button and the Trojan Will be made.
10) Now Send this Trojan File to victim.
11) As and when the victim will install the trojan on his system you will get a notification e-mail on your specified e-mail id while making the trojan. This Email consist of the IP address and port of the victim.
12) now put his ip address in a ''host colum" n put his port in "port colum"
13) After That Click on the “Go Beast ” Button and You will be connected to victims PC.
14) Now Select the action or task you want to execute on victims PC form the given list.
15) Now to destroy or kill the trojan click on the ” server ” tab from the menu.

0 comments:

Saturday 31 May 2014

0

Cracking a Wifi (WEP) Password :-

Posted in , ,
========================
-METHOD 1 :: Getting Past a Log In Password.
----------------------------------------------------------------
1) Boot the computer in safe mode.
2) Click “Start”.
3) Click “Run”.
4) Type in “control userpasswords2”. [1]
5) Change passwords for any account.This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: "Oh, I hear computers glitch like that sometimes. You can always type in recoverpassword if you get locked out and then set a new
6) Reboot the computer.
-METHOD 2:: Getting Remote Access
--------------------------------------------------
1) Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs. [3]
*.The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.
*.You will have to make an account with the LogMeIn website in order to use the software.
2) Log in to the website.Log in to LogMeIn’s website.
3) Navigate to the “My Computers” page. It should open automatically when you sign in.
4) Add the computer you intend to remotely access.You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.
5) Click the name for the computer once it’s added.
6) Log on to the computer.This means you’ll have to know the username and password for the account you’re trying to access or view.
7) Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.
8) Log out when you’re done.
-METHOD 3:: Cracking a Wifi (WEP) Password
------------------------------------------------------------
1) Download the necessary programs.You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access [4]) and AirCrackNG (which will break the security key itself)
*.Make sure your computer’s wireless adaptor is compatiblewith CommView.
2) Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
3) Filter the search to that network. Right click on the network you
want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
4) View Data packets.Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
5) Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
6) Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
7) Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
8) Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
9) Open the newly created file with Aircrack. Start Aircrack and choose WEP. Open the file and click “Launch”.
10) Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown..!

0 comments:

Wednesday 28 May 2014

0

How to protect USB Virus from entering your PC?

Hi friends, i have a solution for your
issue.
You can make your normal pen drive
to virus protected pen drive. for
that u want 1 pc which having
windows vista or 7 os installed.
Follow the below steps……..
1) Connect ur pen drive to pc
which having widows vista or
windows 7 operating system. (The
user must having Administrator
rights)
2) Open ‘My Computer’ & right click
on pen drive icon then select
‘Format’ option. Before formatting
you must take a back up of all of
your data because it deletes whole
data from your pen drive.
3) In Format window select file
system tab & change it to ‘NTFS’
then click on ‘Start’ to start
formatting.
4) After formatting done close the
format window & open your
pen drive.
5) create one folder in pen drive &
rename it to ‘secured’.
6) Back to ‘My Computer’ & again
right click on pen drive & now
select ‘Properties’ tab.
7) In properties window select
security tab then click on edit &
tick on ‘Deny’ for ‘Write’ permission
then press ok to apply the settings.
8) Open pen drive again, right click
on ‘Secured’ folder select
‘Properties’ then ‘Security’ tab.
again click on ‘Edit’ tab & set ‘Allow’
permission to ‘Full Control’ then
click ok to apply settings.
9) Open ‘Secured’ folder, create
one folder into that & rename it to
‘Secured.exe’.
10) Right click on ‘Secured.exe’
folder select ‘Properties’ & make it
hidden by selecting ‘Hidden’
attribute then select ‘security’ tab
click on ‘Edit’ & set ‘Deny’
permission to ‘Full Control’ .
10) Press ‘Ok’ to apply the settings.
Now your pen drive is virus
protected. but u can’t copy files
into that directly. u need to copy all
of your files to the secured folder & I
re-command that copy your software
setup files to the zip folder so,
virus can’t access software’s exe
files

0 comments:

Tuesday 27 May 2014

0

Photo Verification Through Google Image Search

Posted in
Step 1: Go to Google images search
.
Step 2: Type facebook "name of 1st
friend" copyand paste from blocked
account
.
Step 3: Search , you will see the
picture of the1st friend in the 1st 3
results
.
Step 4:If you didn't identify the
picture, repeatthe same
.
Step 5:If you didn't identify the
friend.simply skip the picture and you
will get another one(always you have
2 skips/picture)
.
Step 6: After you identify the 5
picturesfacebook will ask you to
change your passwordand email
password
.
Step 7: Change your facebook account
passwordand confirm that you change
your emailpassword (even you don't)
.
Step 8: Now every thing is OK
.
Step 9: If you see this message(no
verificationmethod is available now)
just logout and wait 1hour to login,
if you failed to verify the
photos,facebookwill give you 1
chance to verify 5pictures every 1
hour.

0 comments:

Saturday 24 May 2014

0

How to reset the trial period of software to work it lifetime?

Posted in
First uninstall the software and follow the steps.
*. After uninstalling software, OpenRUN(Windows key + R) and type regedit and hit Enter.
*. Now Registry Editor Window will appear and here navigate toHKEY_LOCAL_MACHINE­ \ SOFTWARE \ Your Software name from left pane of this window. If you find any Key name with your software name then just Delete that Key.
*. Similarly navigate toHKEY_CURRENT_USER \ Software \ Your Software name and if you find any key with your software name then just Delete it and close the Registry Editor window.
*. Again go to RUN and type %temp% and hit Enter.
*. Now Delete all the things in that folder. Don’t worry these are the temporary files and not necessary for your operating system.
*. Now go to C:\Users\your username here\AppData.Under AppData open all three folders"Local", "Local Low" and "Roaming”and check. Under these three folders if you find any folder or anything with your Software's name, just delete it.
*. Now Restart your PC and install the expired software and you can use it again for trial period."

0 comments:

Friday 23 May 2014

0

Cookie Stealing Attack:

Posted in , ,
Hack Any
Account like Facebook ,Twitter ,
Gmail ,Hotmail ,Skype and yahoo
etc.
Using this method you can hack
Any Account like
Facebook ,Twitter ,
Gmail ,Hotmail ,Skype and yahoo
etc.
this works At
LAN(local Area Network) . its best
place to hack at university, cafe ,
public place where computer
are on one LAN simple Example WI-
Fi.
What is Cookies And how the use
of stealing
cookies? => Cookies are file’s that stored on
Any computer’s By any website
when a you visits them . the
cookie used by the web server to
check the
authenticate the Real user . like you
Enter Login in Facebook then a
unique string’s Generated and the
one copy saved in the web server
and other is saved on your
Browser as a Cookie file .
both are matched when you open
a Account.
so then finally we will start.
Step 1:
Download the Wire Shark and
install it.
Step 2:
Next open the wire shark and then
click on
interface.
Step 3:
Next choose a interface which is
received and
sending packet and click on start
Step 4:
Continue the sniffing for around
like 10 minutes.
Step 5:
After a maximum 10 minute stop
the sniffing by going to a capture
menu.
Step6:
its important step, now filter to
http. cookie contains “datr”. Then
filter the all search for http cookies
with a name of datr and there is
Facebook authentication’ s cookie.
Step 7:
Now click on it and then goto the
copy > Bytes
> Printable Text only
Step 8:
Now for next step you must have 3
thing,
1. Mozilla Firefox [browser]
2. Grease Monkey[add-on]
3. Cookie injector[code]
and then open facebook. com
make sure you are
not login
Step 9:
Press the button Alt C to bring up a
cookie
injector and then Simply paste in a
cookie value
into it.
Step 10
Now refresh your page so then
finally you Enter
the Victim Account.

0 comments:

0

CONVERT IMAGE FORMAT WITHOUT ANY INTERNET AND SOFTWARE

Posted in

STEPS:
1. click on start menu
2. search for cmd.exe
3. copy the image that you want to
convert on desktop.
4. now name that image as (im)
5. check it's format by going into
it's properties.
6. write this command in
command prompt :
cd desktop
copy /b im.(original format) "fi.
(final format)"
for example : if i have a image
name as im and it's format is png. i
wants to convert it into ico format,
then i has to write this command
in command prompt :
cd desktop
copy/b im.png "fi.ico"
it's over, command prompt will
change it's format into specified
format and save the file on
desktop.

0 comments:

Saturday 17 May 2014

0

Delete an “Undeleteable” File

Posted in ,
Delete an “Undeleteable” File
Open a Command prompt window and leave it open.
Close all the open Programs.
Click Start,Run and enter TASKMGR.EXE.
Go to the Processes tab and End Process on Explorer.exe.
Leave Task Manager open.
Go back to the Command Prompt window and change to the directory the AVI(or undeletable file) is located in.
All the Command Prompt type DEL <filename> is the file you wish to delete.
Go back to Task Manger, click file,New task and enter EXPLORER.EXE to restart the GUI shell.
Clode Task Manger.
Open Task Manger.

Or

You can try this.
Open Notepad.exe.
Click File>Save As..>
Locate the folder where your undeletable file is..
Choose ‘All Files’ from the file type box.
Click once on the file you wanna delete so its name appears in the ‘filename’ box.
Put a “ at the start and end of the filename.
(the filename should have the extension of the undeletable file so it will overwrite it).
Click save.

It should ask you to overwrite the existing file, choose yes and you can delete it as normal.

0 comments:

0

Convert Mozilla Browser To Keylogger:

Posted in ,
Fact:
Whenever you login into any website using mozilla firefox browser it always ask’s
you whether you want to Save password or not for that website.

Trick:
We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later.

The key-logger will work on the basis of a script that disables the Firefox browser to ask the user to save his password whenever he logins to a website. Thereby, allowing the Firefox to store his username and password combination automatically
without prompting the user.

Follow these steps to convert your firefox into a keylogger :

1. First and foremost, download the firefox keylogger script.

2. If you are a Windows user, then navigate to C:/Program Files/Mozilla
Firefox/Components and if you are using MAC, then navigate to Applications -> Right Click Firefox -> Show Package Contents -> Contents/MacOS/Components

3. In the downloaded rar file, you will find a script named as nsLoginManagerPrompter.js, simply extract and then copy and paste the file in the folder that is applicable to you.

4. Your Firefox keylogger is now ready and whenever anyone enters his username and password on any site,his/her details would be saved automatically which can be easily retrieved using Fire Password viewer!!!

0 comments:

Tuesday 29 April 2014

0

How to Track Lost Android Phone and Tablet

Posted in
Your Android gadgets are the most important things in your life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Use the IMEI Number


Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B


Another way of tracking your lost Android gadget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.

Lookout Security and Antivirus


Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.

Android Device Manager


Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the site http://sh.st/wQTtX and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet.

0 comments:

Monday 28 April 2014

0

Free Access To Websites Without Registering

Posted in
Free Access To Websites Without Registering

Go to

-http://bugmenot.com/

and type the URL of the website you want to log into.
Examples:

-http://www.nytimes.com/, -http://www.winnetmag.com/
etcetera.

Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+

-http://www.googlebot.com/bot.html

This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

-http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.

0 comments:

Sunday 27 April 2014

0

Top 10 free PC programs everyone should have

Posted in
There are millions of free and open source projects available, many of them better than any commercially available product. Below is a short listing of what we think is the best out there, broken down into ten categories.

Antivirus and malware protection

Most PC users realize that they need protection on their computer or may have an installed antivirus program from their computer manufacturer. What most don’t realize is that there are free programs that are just as good and in some cases better than the commercial products. Below are our recommendations
antivirus program: Avast! or AVG
Malware and Spyware protection: Malwarebytes

Backup solutions

There are dozens of free and commercially available backup programs for computers. Unfortunately many of those backups are stored locally, meaning if your house were to catch fire, get robbed, or if you lost your backup discs all your data would be lost. This is why when dealing with important data we suggest users use online backup services.
Online backup solution: Mozy or Dropbox

Browsers

Although Microsoft Internet Explorer comes pre-installed on Windows computers. There are several excellent free alternatives that everyone should try. These free alternatives can often be faster, have more options, and in many cases be more secure than Internet Explorer.
Internet Browser: Mozilla Firefox or Google Chrome

Compression utility

When downloading files on the Internet you’ll eventually encounter a .zip, .rar, or other compressed file. Dealing with these files can be easy with our below free file compression utility.
File compression utility: 7-Zip

Disc ripper and creation utility

Creating an audio or data CD/DVD, ripping the data from an audio CD, or creating a CD from a .ISO file can also be done freely using our below free recommendation.
CD burner utility: CDBurnerXP

E-mail

E-mail is yet another service that can be done freely. Most users today use online e-mail solutions like the one listed below. However, for those still using an e-mail client such as Microsoft Outlook we strongly suggest one or both of the below suggestions.
E-mail client: Mozilla Thunderbird
Online e-mail: Gmail

FTP, SFTP, and SSH Utility

Users who maintain their own web page or need to upload or download files to or from a server will have to use an FTP utility or a SSH client. There are many commercial programs capable of doing this but our below free recommendations beats them all.
FTP client: Filezilla
SSH client: Putty

Image editor, paint program, and picture organizer

There are many great free solutions for editing, creating, and organizing your images on your computer. Many of the programs capable of doing these tasks can be several hundred dollars, but all of the below programs are completely free.
Image editor: GIMP
Paint program: Paint.net
Picture organizer: Google Picasa

Multimedia

There are dozens of different multimedia programs with different capabilities and limitations. Below are our top free multimedia programs for watching video files and recording audio.
Audio editing and creating tool: Audacity
Video and DVD Player: VLC

Office Suite

An Office suite such as Microsoft Office is often one of the most expensive programs that a user can install on their computer. Why install these expensive programs when there are free solutions that are just as good.
Office suite: OpenOffice
Notepad and Source code editor: Notepad++

0 comments:

Saturday 26 April 2014

0

Create your own Anti-Virus in Notepad++

Posted in ,
Create your own Anti-Virus in Notepad++ … mind you this meant against low level macro viruses.
For other you should pull out the big guns
Type the following code into Notepad:
@ echo off
echo off turn off the active virus
taskkill / F / IM virusname1.exe / IM virusname2.exe
echo Deleting all of viruses based on size
for / RC: %% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA “%% a”
echo deleting hidden virus
echo for drive c and subfolders
for / R C: %% a in (*. doc.exe) do del “%% a”
echo for drive d and subfolders
for / R D: %% a in (*. doc.exe) do del “%% a”
echo Unhide Document
cd / d c:
echo for drive C and subfolders
*. doc attrib-H-S-A / S
cd / d d:
echo for drive D and subfolders
*. doc attrib-H-S-A / S
exit
Save the file with bat extension, For example antivirus.bat. then go to command prompt and run the Notepad file

0 comments:

0

How to Remove Virus Through Command Prompt

Posted in ,
Virus could be a malicious program that may copy itself and infect your pc. These viruses will unfold via USB/flash drive or from one pc to different pc by few written codes. There area unit several antivirus software system out there to get rid of viruses from pc. however there area unit some viruses or suspicious files thatcan’t be removed by any antivirus software system. Some suspicious files like autorun.inf initiate all the viruses incomputer. These files should be removed for safe operation of your computer, as a result of they will causeknowledge loss, software system damages etc. Such viruses and files is removed by victimization cmd. during this article we’ll discuss a way to take away a plague victimization electronic communication. Following steps is wont to take away a plague victimization electronic communication from your pc.

Go to begin menu and kind “cmd” within the search box or Start>all programs>accessories>command prompt.
->Open the infected drive like write , g: to travel to G drive.
->Now kind dir/w/a . it’ll show all the files of the drive as well as hidden files.
-->Locate AUTORUN.INF or any Virus and different suspicious files within the directory.
->there was no virus in my drive thus solely autorun.inf is been highlighted.
->Type command attrib -r –a –s –h to get rid of attributes of corresponding file.
->Type del autorun.inf to delete autorun.inf file.
->Now kind del virus name.exe t delete it, eg : del newfolder.exe .
(You may delete viruses by victimization following steps:
->When you notice AN Autorun.inf file or the other uncommon .exe file simply rename it.
->Syntax for rename is (rename computer filename.extension new name , for example: (rename autorun.inf virus) to rename autorun.inf file. Here I even have renamed it by “virus”.
->Now you’ll be able to access the defected drive while not touching the virus.
->To delete the renamed file move to the defected drive and choose the file you renamed.
->(Now delete the harmful renamed files.)
->You have deleted that virus with success however typically virus resides within the Recycler folder.To find this folder:
->Type cd recycler command.
->Again kind dir/w/a to find all file of the folder.
->Identify malicious files and delete them victimization on top of commands.
->Follow the on top of steps rigorously and that i suppose this data is enough to get rid of a plague victimization electronic communication simply.
->Important: ensure that no different processes being running whereas activity these actions. better of luck.






0 comments:

0

How to Create more than one file with the same name in the Same Folder

Posted in
Hi guys today i wanna tell you how to create the different files of same name in the same folde.

-> Suppose you want to create a file of name "Anonymous".
->Save the name in the Data folder.
->Now if you want to create a file in DATA folder with Anonymous name.
->Now Just type the name of file again Anonymous then press Alt+0160.
->Now press the save button.
     That's it......................
->Now you have two files in the data folder with the Same name...........

Enjoy and Have a nice day.

0 comments:

0

Short cut for Windows operating system helpful for computer section

Posted in ,

***********************
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restore the minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch Filter Keys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the Mouse Keys either on or off)
17. SHIFT five times (Switch the Sticky Keys either on or off)
18. NUM LOCK for five seconds (Switch the Toggle Keys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the sub folders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first sub-folder)

0 comments:

Sunday 2 February 2014

0

HOW TO DISABLE USB PORT?

Posted in

Disable USB port:

1. Goto run

2. Type 'regedit' without quotes

3. Click on HKEY_LOCAL_MACHINE

4. goto SYSTEM

5. Click on CurrentControlSet

6. Click on services

7. Goto USBSTOR

8. Double click on 'Start' where value is 3

9. Now change the value data with 4

10. Now press ok and refresh your desktop your USB port is disabled, to enable the usb port replace the value 4 with 3

0 comments:

Saturday 1 February 2014

0

How to Change the Displayed Name of the Processor in Windows 7, XP, and Vista

Posted in

Step One: Open up the Registry editor (RegEdit).
First, click Start, and search RegEdit (Windows 7/Vista). Open up regedit when the search has found it.

Step Two: On the left hand column in Registry Editor, open HKEY_LOCAL_MACHINE, under it,
open up: Hardware->DESCRIPTION->System->CentralProcess
or->1

Step Three: Now you can see a few lines of text on your right side in Registry Editor. Double-Click the one that is named "ProcessorNameString". A small box will pop-up, and you can change the processor's name to anything you like. After your done, press enter and close Registry Editor.

Step Four: Now we will see what we have changed under Windows.
Open Start, and Right-Click Computer, then click Properties in the Context Menu

Step Five: You can see your processor name changed to what ever you changed it to .

Troubleshooting: If the processor name did not change, Do step one, but on Step Two, instead of going into the number 1, go into number 0, and follow the rest of the Tutorial....................

0 comments:

0

HOW TO REMOVE SHORTCUT VIRUS?

Posted in ,
If your Pen Drive is infected with any of the following viruses:
* Autorun.inf
* new folder.exe
* Iexplorer.vbs
* Bha.vbs
* nfo.exe
* New_Folder.exe
* ravmon.exe
* RVHost.exe or any other files with extension.
Actually this viruses are hidden and can't be seen even after you enable show hidden folders.
Following simple dos command will change the attributes of these files ,there after you can remove it by pressing delete key.
Follow these steps:
Step1.:Type cmd in Run
Step2.: Switch to the drive on which pen drive is connected (like C:\> h: enter)
Step3.: type exactly as attrib -s -h *.* /s /d and hit enter (don't forget spaces).
Now you can see hidden virus files and you can delete them.
Done ENJOY.....!!!

0 comments: