Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Thursday, 15 September 2016

How to Create a Nameless Folder in your Computer



Today we will talk about how you can create a nameless folder on your pc by following a simple step, this trick can be very essential especially when you want to keep a certain folder hidden from other users of your pc. This can also be an amazing trick to play around with and make your friends jealous.
Sometimes you may have some folders or files you don’t want your friends to see on your computer, so by making a nameless folder it makes the folder hardly noticeable by your friends.

How to create a nameless folder on windows:
1. First you have to create a New Folder in your desired location. 



2. Right Click on the New Folder and Select “Rename”. 


3. Now delete the text “New Folder” leaving your mouse pointer on the name box. 

4. Now Press and Hold your “ALT Key” and Type 0160 from your Num Lock Keypad. 

5. Then Leave the “ALT Key” and press the “Enter” key. 

Now you have successfully created a nameless folder on your Pc by following some few steps.
NOTE: the above step is applicable on windows operating system.




DON'T FORGET TO LEAVE YOUR COMMENTS AND ALSO SHARE THIS POST
Read More »

Sunday, 28 August 2016

How to Spy on WhatsApp Messages


WhatsApp is one of the most widely used instant messaging applications during the recent years. Attractive features like cross-platform support and media sharing has made WhatsApp to be the top choice among most users. 
On the other hand, WhatsApp has also become a favorite application for many cheaters to exchange secret messages and maintain illicit relationships. Therefore, in order to investigate the truth about their partners or children it becomes inevitable for many individuals and parents to spy on WhatsApp.

Ways to Spy on WhatsApp

In the post we will talk about how you can spy on whatsapp using Mspy

WhatsApp Spy using a Spy App:

Using a spy app is the easiest way to spy on WhatsApp messages. Although there are a handful of companies marketing substandard WhatsApp spy apps on the market today, there exists a few genuine ones as well that are worth considering. One of my favorite app to spy on WhatsApp is mSpy Premium which is known for its quality and top notch features.

The following are some of the exciting features of mSpy Premium which makes it a perfect to spy on WhatsApp messages:

mSpy Premium Features:

  • Spy on WhatsApp Messages and Chats.
  • WhatsApp Spy on Group Messages.
  • Spy on Internet activity including social media like Facebook, WhatsApp, Twitter and Gmail.
  • Spy on GPS locations in real-time.
  • Spy on WhatsApp Contacts.
  • Spy on keystrokes, photos and videos.

Spy operation works in a complete stealth mode and thus remains undetected!.

How it Works?

You will have to download and install the mSpy Premium app onto the target phone where you need to spy on WhatsApp messages. Installation and configuration takes only a few minutes. However, for this you should have the target phone in your hand at least for a few minutes.

Once the installation is complete, the monitoring process of all the above mentioned activities (WhatsApp messages, calls, SMS, Internet, GPS, camera etc.) will begin and the recorded logs are silently uploaded to your mSpy Premium account. You can login to your online account at any time to view the logs containing WhatsApp messages and other activity details as shown in the demo. You can download mSpy Premium from the link below:



Compatible Phones: Android, BlackBerry, Apple iPhone, Windows Mobile, iPad and Tablets.

DON'T FORGET TO LEAVE YOUR COMMENTS AND ALSO SHARE THIS POST
Read More »

Monday, 8 August 2016

The World's Most Dangerous Computer Viruses



Here are five most dangerous computer viruses of all time:

1. ILOVEYOU
Perhaps the most virulent computer virus ever created, the “ILOVEYOU” virus managed to wreck PCs all across the world. Infecting almost 10% of the world’s PCs connected to the Internet, the virus caused a total damage of around $10 billion.

The virus is transmitted via email with a subject line “ILOVEYOU,” which is a radical human emotion that no one can ignore. To make it even more alluring, the email contained an attachment that read something like this: Love-Letter-For-You.TXT.vbs. The moment someone opened the file, the virus emailed itself to the first 50 contacts available in the PC’s Windows address book.



2. Melissa
Melissa became the breaking news on March 26, 1999, after hitting the new age of emailing. Built by David L, Melissa was spread in the form of an email attachment by the name “list.doc.”



When a person clicked upon the attachment, the virus would find the Microsoft Outlook address book and email itself to the first 50 contacts on the list having a message “Here is that document you asked for…donot show anyone else.” Later on, FBI arrested David L and slapped him with a fine of $5000 for creating the wildest virus of its time.




3. My Doom
My Doom hit the malware world in 2004 and spread exponentially through email with random addresses of senders and subject lines. Infecting somewhere around two million PCs, My Doom smashed the cyber world by instigating a tremendous denial of service attack. It transmitted itself via email in a specially deceitful way that a receiver would first consider a bounced error message that read “Mail Transaction Failed.”

However, as soon as the receiver clicked upon the message, the attachment executed and the worm transmitted to email addresses found in the user’s address book. It is easy to believe that this mass mailer worm caused a damage of almost $38 billion.



4. Code Red
Taking advantage of the Microsoft Internet Information Server’s flaw, Code Red spread on the network servers in 2001. Here is an amusing fact about this dangerous virus—it didn’t need you to open an email attachment or execute a file; it just required an active Internet connection with which it ruined the Web page that you opened by displaying a text “Hacked by Chinese!” It’s no surprise that this virus devastated nearly $2.6 billion dollars by hitting almost one million PCs.

And in less than a week’s time, the virus brought down over 400,000 servers that included the White House Web server as well.



5. Sasser
Sasser was a Windows worm that was discovered in 2004. Apparently, it would slow down and crash the PC, making it even hard to reset without cutting the power. And its effects were surprisingly troublesome as well, with millions of PCs being infected and crucial, significant infrastructure affected.

The worm played on a buffer overflow susceptibility in Local Security Authority Subsystem Service (LSASS) that monitors the safety policy of local accounts causing crashes to the PC. The devastating effects of the virus were massive resulting in over a million infections. This included critical infrastructures, such as new agencies, hospitals, airlines, and public transportation.



6. Conficker


Also known as Downup or Downadup, Conficker is a worm of unknown authorship for Windows that made its first appearance in 2008. The name comes form the English word, configure and a German pejorative.It infects computers using flaws in the OS to create a botnet. The malware was able to infect more than 9 millions computers all around the world, affecting governments, businesses and individuals. It was one of the largest known worm infections to ever surface causing an estimate damage of $9 billion.
The worm works by exploiting a network service vulnerability that was present and unpatched in Windows. Once infected, the worm will then reset account lockout policies, block access to Windows update and antivirus sites, turn off certain services and lock out user accounts among many. Then, it proceeds to install software that will turn the computer into a botnet slave and scareware to scam money off the user. Microsoft later provided a fix and patch with many antivirus vendors providing updates to their definitions.



7. Flashback

Though not as damaging as the rest of the malware on this list, this is one of the few Mac malware to have gain notoriety as it showed that Macs are not immune. The Trojan was first discovered in 2011 by antivirus company Intego as a fake Flash install. In its newer incarnation, a user simply needs to have Java enabled (which is likely the majority of us). It propagates itself by using compromised websites containing JavaScript code that will download the payload. Once installed, the Mac becomes part of a botnet of other infected Macs.
The good news is that if it is infected, it is simply localized to that specific user’s account. The bad news is that more than 600,000 Macs were infected, including 274 Macs in the Cupertino area, the headquarters of Apple. Oracle published a fix for the exploit with Apple releasing an update to remove Flashback from people’s Mac. It is still out in the wild, with an estimate of 22,000 Macs still infected as of 2014.a

 


Computers are amazing, but they just do what they’re told, and when viruses tell them to do bad things, it can create a lot of damage.
Read More »

Thursday, 7 July 2016

See The Full Specification Of Hp Elite X3 [New Smartphone From Hp]

HP managed to surprise us at the MWC with the announcement of a Snapdragon 820-powered flagship - the Elite x3. The 6" phablet is running on Windows 10 Mobile and supports Windows Continuum.



What's most interesting about the HP Elite x3 is the IP67 certifications for water and dust resistance, as well as the MIL-STD 810-grade salt, fog, humidity, transport shock and thermal shock resistance. How about that?
The HP Elite x3 has a big 6" display of 2K resolution (1440 x 2560) and runs on the Snapdragon 820 chipset with 4GB of RAM and 64GB expandable storage. The built-in 4,150 mAh battery should come in handy, too.
The design will presumably have a gold body with a gold metal component at the bottom, which is a bit curious. HP recently released a new Spectre laptop with a black and gold motif, and a matching design would seem appropriate for Elite x3.
Additionally, the color option appears to be more limited than the standard Graphite/Chrome model with a footnote mentioning "Gold/Gold color option not available in all countries."

HP Elite x3 detailed specifications

GENERAL
Form factor     Touchscreen
Battery capacity (mAh)          4150
Removable battery      No
SAR value       NA

DISPLAY
Screen size (inches)     5.96
Touchscreen    Yes
Resolution       1440x2560 pixels

HARDWARE
Processor         2.15GHz  quad-core
Processor make           Qualcomm Snapdragon 820
RAM   4GB
Internal storage           64GB
Expandable storage     Yes
Expandable storage type         microSD



CAMERA
Rear camera    15-megapixel
Flash    Yes
Front camera   8-megapixel
SOFTWARE
Operating System       Windows 10 Mobile

CONNECTIVITY
Wi-Fi   Yes
Wi-Fi standards supported     802.11 a/ b/ g/ n/ ac
GPS     Yes
Bluetooth        Yes
NFC    No
Infrared           No
USB OTG       No
Headphones    3.5mm
FM      No
GSM/ CDMA GSM
3G       Yes
4G/ LTE          Yes
Supports 4G in India (Band 40)         No

SENSORS
Compass/ Magnetometer        Yes
Proximity sensor         Yes
Accelerometer Yes
Ambient light sensor   Yes
Gyroscope       Yes
Barometer       No

Temperature sensor     No

DON'T FORGET TO LEAVE YOUR COMMENTS AND ALSO SHARE THIS POST
Read More »

Tuesday, 5 July 2016

How To Create Folder Without Any Icon in Windows 10

This may not be a news for window users, some of you may already be aware of creating a folder without any icon in Windows operating system, but this was not familiar with many of the users and I also don’t see any much talk about this on the web. 


So I have decided to make a tutorial on how to create a folder without any icon in the latest operating system Windows 10. There is no need for any code or complicated steps involved in it. Any basic user can do this task with simple steps. 

Windows 10 has many inbuilt features, but for creating the folder without any icon, the procedure is same as the previous version of windows operating system.

How can it be possible? By default windows have a blank icon image, which allows as to create a folder without any icon.
How To Steps:
1. First, Create a Folder.
2. Next, Right-Click on the folder and click Properties.
3. Now on the Properties window, navigate to Customize tab.
4. Under Folder icons, click on Change Icon button, now the list of icons will be displayed from the path %SystemRoot%\system32\SHELL32.dll


5. Just scroll right and within few clicks, you may see a blank icon as shown below. Choose the blank icon and click ok, then again press ok on the properties window.


6. That’s it. Now your folder will be displayed without any icon.



Just give a try and let me know if you face any difficulties. Please feel free to drop a comment.
Read More »

Sunday, 3 July 2016

How to Recover an Unsaved Document in Microsoft Office

While working on Microsoft word, There are times when you become so engrossed in your work that you forget that you never saved your document. 
And in a rush to get to that next task, you close the file without saving it. It may also happen that your laptop crashed or there was power breakdown before you had a chance to save the file you were working on. 


Whatever be the reason for your failure to save your document may be, Microsoft offers some hope for recovery. By default, Office applications automatically save backup copies of your documents every 10 minutes as you work and although this is just temporary, you have a good chance of recovering them the sooner you discover your mistake. Here’s how to recover an unsaved document.

How to Recover an Unsaved Document

This tutorial was performed in a Word 2016 document, but the steps should be more or less identical in previous versions of Office as well.
1. Open the Office application that you were working on when your file did not get saved. If it was a Word document that did not get saved, open Word.
2. Select the File tab and click Info.
3. On the Info page, click Manage Document and from the drop-down menu, choose Recover Unsaved Documents.






NOTE: Alternately, you can select the File tab and in the Open tab (on the left pane) in the Recent section, you can scroll down the right pane and select Recover Unsaved Documents.
4. The Open dialog box will open up. This will take you to the UnsavedFiles folder where all your unsaved files are temporarily backed up. Select the file you need and then click Open.




5. You can now save your file in a location of your choice.

How to Change the Way Office Automatically Save Files

Office applications are highly customizable and this works even when it comes to changing the way it automatically saves temporary files. You can decide where you want your files saved, how often they should be saved, and whether to save a temporary file if you close a document without saving. Here’s where you can set or customize those options.
1. Open Word and select the File tab.
2. On the File menu, click Options to open up the Word Options dialog box.
3. In the dialog box, select the Save tab.
4. In the right pane, in the Save documents section, select the options as per yourrequirement.




You can change the AutoSaving time to less than 10 minutes if that seems like a long time to you. Two minutes is something that I prefer to set it at, but you can choose a timing from every one minute to every 120 minutes.
The other 2 options are better off at their default settings as you always want to keep the last autosaved version if you close without saving and the file saving location is easier to access at its default setting than at one you may choose on your own.
That’s it! The Office recovery feature will not save you from every kind of situation you may face with regards to losing your data, but it can definitely come in handy when you accidentally close a document without saving it.

WAS THIS ARTICLE HELPFUL?


Read More »

Thursday, 23 June 2016

How To Remove Your Contact Details from TrueCaller


  • What is Truecaller?
  • What is the Danger of Using Truecaller?
  • How does Truecaller source this Data?
  • Steps to deactivate your Truecaller account
TrueCaller is the global mobile community, were it has a huge database of contact details of contact numbers. The users can share their contact list to the truecaller database to make the contact details visible to anybody. In this case, if you are one of the contact in your friend’s contact list and he shared the details to truecaller database, then your contact details will be visible to anyone globally. 
What is the Danger of Using Truecaller?
Not everyone knows this, but for some fixed-line phones,Truecaller even lists the address of the landline. This doesn't mean much when telemarketers or spammers call from an office address, but ideally you wouldn't want strangers to know your home address just because you called them from your landline.
How does Truecaller source this Data?
Of course Truecaller sources this data from public data sources. This is because if someone knows your landline number, they can easily find the registered address via any publicly available phonebook (many telcos have this information public) or even by simply searching for your landline number on Google.
For this reason, you should consider removing your number from Truecaller's database. Note that you can't remove your number from the service if you are using the app. You'll have to deactivate your own account to get your number removed. If you were hoping to get just your number removed, while seeing contact details of everyone else who calls, you're out of luck.
If you are ready to remove Truecaller once and for all, here's what you need to do. If you are using the app on iPhone, Android, or Windows mobile, here's how to deactivate your Truecaller account


Steps to deactivate your Truecaller account
Android
Open the app > tap the people icon in the upper left corner > Settings > About > Deactivate account.
iPhone
Open the app > tap the gear icon in the top right corner > About Truecaller > Scroll down >Deactivate Truecaller.
Windows Mobile
Open the app and tap the three dots in the bottom right corner > Settings > Help > Deactivate account.
Once you have deactivated your Truecaller account, you can proceed to removing your number from the service. Here's how.
How to remove your number from Truecaller
1.      Go to the Truecaller unlist page.
2.      Enter your phone number with the correct country code. For example: +234709999999 or +919999999999.
3.      Tick one of the reasons for unlisting, or if you wish, type your reasons for removal in the Other form.

4.      Key in the verification captcha.
5.      Click Unlist.
Truecaller claims that it removes these numbers up to 24 hours after receiving an unlist request. This doesn't always mean that your number will stay off the service forever. We'd removed our mobile number around a year ago but it started appearing again on the service a few days ago even though we've never used Truecaller. Your best bet is to keep checking with Truecaller users whether they see your contact details. If they don't, you're good to go. If not, you can always ask them to unlist your number.




DON'T FORGET TO LEAVE YOUR COMMENTS AND ALSO SHARE THIS POST
Read More »

Thursday, 9 June 2016

HOW TO DOWNLOAD ANY VIDEO FROM FACEBOOK

Today l will talk about two different easy ways you can download videos from facebook to your pc or mobile phones.
Here is how you can download any facebook video of your choice straight to your device.

To get his done, carefully follow the steps below.


  • login to your facebook account.
  • click on your desired video.
  • Now copy the url of the video

  • then visit http://www.fbdown.net/index.php

  • paste the url you copied from the video in a textbox that says enter url then click download
  • your video will be fetched and downloaded.


Method 2

  • login to your facebook account.
  • click on your desired video.
  • Now copy the url of the video.

  • then visit http://en.savefrom.net

  • paste the url you copied from the video in a textbox that says "just enter a link" then click download
  • your video will be fetched and downloaded.

also for android users you can download faceboook video downloader from playstore.




DON'T FORGET TO LEAVE YOUR COMMENTS AND ALSO SHARE THIS POST
Read More »

Thursday, 2 June 2016

HOW TO DISABLE YOUR WINDOW 8 LOCK SCREEN

Here in this tutorial l will teach you how you can disable your windows 8 Lock screen following a simple step.


Similar to your smartphone’s lock screen, Windows 8 operating system also shows the time, date, battery percentage, etc., and for any PC user who would like to remove it and go straight to account login, here’s how to do it. follow the steps below carefully.




How to disable the lock screen via Registry Editor:


Note:You will need to close all the running programs or reboot the PC prior to making registry edits, and make sure you’re logged in as the Administrator. This hack works in any version of Windows 8.


  • step1:Press “Window key + R” on your keyboard to launch the Run bar.
  • step2:In the Run bar, type "regedit"
  • step3:Click “Yes” once the UAC asks you for access 
  • step4: From the Registry Editor folders, go to this path:"HKEY_LOCAL_MACHINE>SOFTWARE>Policies>Microsoft>Windows>Personalisation"
 
  • step5: If you can’t find the folder “Personalisation,” you need to create the folder first to keep the DWORD “NoLockScreen.”
  • step6: Right-click the “Windows” folder and then hover the mouse to “New” and choose “Key.” Name the key “Personalisation.”
  • step7: Right-click the “Personalisation” folder and hover the mouse to “New.” Choose the “DWORD (32-bit) value” and you’ll see the new value in the folder 
  • step8: Name the DWORD “NoLockScreen.”


  • step9: Right-click “NoLockScreen” and click “Modify.” Change the value from 0 to 1 and click OK. 
  • step10:Exit the Registry Editor and reboot/restart your PC. You have successfully tweaked the lock screen if your screen shows you the user login instead of the lock screen.


However, in my test running, my first attempt was unsuccessful because of this one letter that the system was unable to acknowledge:“S”

  • Note: My OS runs a US-English language, and I labelled the key “Personalisation” (following UK-English for screenshot purposes) instead of “Personalization.” After restarting the system, the lock screen wasn’t disabled. So, I renamed the folder following the US spelling of “Personalization,” restarted the PC and now I bypassed it.  
To get the lock screen back, simply follow the first four steps above, and under the “Windows” folder, right-click “Personalization” key and choose “Delete.” Exit the Registry Editor and restart the system; you’ll find the lock screen again after startup, safe and sound.
Again, make sure that you’re on that same path as mentioned.
Read More »

recent comments