News Trending

How to Activate 'God Mode' on Windows 7 and 8

No comments:
Maybe you have heard about ‘God Mode’, something that allows you to access all sorts of settings you normally can’t see or find in Windows 7 or 8? It's literally your control panel on steroids. There are programs to do this for you (we will get to this in a minute) but it also very easy to activate yourself in less than a minute. Here’s how:

Step 1: Right click on your desktop and select New, Folder. See screenshot below showing how it will appear:

Optionally, if you don't want a desktop icon you can create a new folder in your C: drive by using either Windows Explorer or My Computer and simply right click on C: and select New, Folder. You can then access it there anytime.

Step 2: Copy and paste this for the new folder name:


See screenshot below:

Step 3:

The folder will now be a shortcut to 'God Mode' on your desktop. See screenshot below.

When you click it, you will find tons of hidden settings you can modify. See screenshot below:

Read More

How to Prevent Your Computer from Overheating (and Why It's Important)

No comments:
How to Prevent Your Computer from Overheating (and Why It's Important)

Keeping your computer running within safe temperatures is important, especially as the temperature rises outside. Here's how to make sure your computer's not overheating—and how to fix it if it is.
The cooling system of your computer is one of the most important features of the device. Without the cooling system, the electrical components of your computer wouldn't be able to function; overheating would damage the integral parts of what makes your computer work. The heat has to be dissipated in order to keep everything working within safe operating temperatures

Why an Overheated Computer Is Dangerous

Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer's internal organs—the motherboard, CPU, and more—significantly shortening its lifespan.
Besides the most obvious reason to keep your computer cool, a hot computer will also run slower than a cooler computer. So to prevent your computer from slowing down, make sure that it is running at a moderate or low temperature.

What Temperature Should My Computer Be Running At?

Because of the different types of computer makes and models out there, the safe temperature range your computer should run at varies. The safe operating range depends on things like processor type, manufacturer, and other factors that make it impossible to give an answer that applies to all CPUs.
According to the folks at the Overclockers Club (a site dedicated to pushing CPU performance to its limits without overheating your CPU):
AMD and Intel both have maximum temperature ratings for their CPUs listed around 80C. If your CPU gets this hot, you've got some serious problems. Most people try and keep the CPU temperature below 40C at idle and below 55C at load.

How to Check the Temperature of Your PC

Sticking your hand over your computer's ventilation system or case isn't an accurate way to judge how hot your computer is running. (However, it can be a good gauge of whether your computer is getting progressively hotter, or climbing to astronomical temperatures. It should not be so hot that you would want to pull back your hand.) So how do you determine how hot your system's running? You've got a few options.
To check the computer's temperature without additional software, you can check your system BIOS. Restart your computer, and on the boot screen, you should have an option to press a key (often Delete) to enter the BIOS. Once you enter Setup, navigate the BIOS menu using the on-screen instructions. You should be able to find a menu that deals with the computer's hardware monitors and CPU. There should be a field that lists your CPU temperature.
How to Prevent Your Computer from Overheating (and Why It's Important)
Rather not restart your computer to check the temp? We don't blame you. Plenty of system monitoring tools can give you a temperature read-out, like free Windows program HWMonitor, which displays the temperature of the CPU, each of the computer's cores, video card, hard drives, along with the minimum and maximum values of each temperature. (Unfortunately, you'll need to make sure that your hardware is supported because the program can only read certain sensors.)
We've featured several system monitoring options in the past that can also handle these duties, like the cross-platform, previously mentioned GKrellM (Windows/Mac/Linux), system-tray friendly app Real Temp, Core Temp, and SpeedFan. SpeedFan has the added bonus of being able to show how fast each fan is spinning, complete with RPM readings.

How to Keep Your Computer From Overheating

Most computers come with adequate cooling systems and plenty of fans, but here are some steps you can take to ensure heat doesn't become a problem.
Keep it clean: The first step in overheating prevention is making sure that the insides of the computer are kept clean. We've covered how to give your computer a spring cleaning to get rid of the dust that's a huge culprit in raising your computer's temperature.
How to Prevent Your Computer from Overheating (and Why It's Important)

Dust is an insulator. When you crack open the case of your computer and [it's blanketed with dust] you're looking at a computer that's facing a radically reduced life span. Every inch of it is covered with a blanket of insulating dust that raises the temperature of components across the board. Your computer might not be that dusty but given how easy it is to clean out a computer, it's ridiculous not to. Not taking the time to dust out your computer once or twice a year is like being too busy to get your oil changed.

Avoid hot neighbors: It's also important to check the physical location of your computer. If you have devices nearby that are blowing hot air into the computer's intakes, that's not good either. Ideally, the flow of air where the fans are should be steady and adequate, with room for the computer to breathe.

If Your Computer Overheats Anyway

Here's a word of caution: If your computer is overheating, resist the urge to take the side of the case off the computer. It's a rookie mistake that will often make the problem worse. Because most computers are very carefully designed to ensure that cool air is delivered to critical components, removing the side of the case disrupts the circulation (convection) system.
Instead, shut down the computer and let it cool down. From then on, you can plan a course of action that involves doing some cleaning if necessary, potentially upgrading your BIOS (check your motherboard's manual or web site for details), or planning some system-cooling upgrades if necessary.
If your computer is clean, your BIOS is up to date, and you're still having temperature problems, crack open your computer and check for damaged fans and heat sinks. Check for cracks, missing pieces, and make sure all the push pins are secure and all the appropriate fans are running. Secure and/or replace any loose or damaged cables. If you find you've got broken fans or a damaged heatsink, you can buy and install new cooling hardware for relatively cheap, and finding a highly rated, compatible fan or heatsink on a site like Newegg can potentially go a long ways toward keeping your computer cooler.
If you're not comfortable cracking open your PC and installing new parts, this is the point that you may want to consider finding some professional help.

Read More

How to hide any folder or files in android without any third party software

No comments:

Stuffs You're Gonna Need:
  1. A working android device.
  2. A File Manager (default).
  3. Few fingers to work with.
  4. A Goat (optional).

First of all switch on your phone and unlock it . Now open your file manager. For this tutorial, I'm using the default file manager of Galaxy Y.


Next go to your file manager settings and look for the term, Show Hidden Files/Folders. And enable/mark it as shown in the figure below. Then save your settings.


Now rename the existing folder you want to hide or create a new one. While renaming the folder just add an extra dot (.) right before all the characters. And save it. Refer to the following screenshot for better understanding.


After that go to the file manager settings again and disable/unmark Show Hidden Files/Folders option. You're all done. The files at the folder will not be viewable at Gallery.
Read More

Windows Security

No comments:

Security Architecture of Windows

 There are three components of Windows Security:
 LSA (Local Security Authority)
 SAM (Security Account Manager)
 SRM (Security Reference Monitor)

LSA (Local Security Authority)

 LSA is the Central Part of NT Security. It is also known as Security Subsystem. The Local Security Authority or LSA is
a key component of the logon process in both Windows NT and Windows 2000. In Windows 2000, the LSA is
responsible for validating users for both local and remote logons. The LSA also maintains the local security policy.

 During the local logon to a machine, a person enters his name and password to the logon dialog. This information
is passed to the LSA, which then calls the appropriate authentication package. The password is sent in a nonreversible
secret key format using a one-way hash function. The LSA then queries the SAM database for the User’s
account information. If the key provided matches the one in the SAM, the SAM returns the users SID and the SIDs
of any groups the user belongs to. The LSA then uses these SIDs to generate the security access token.

SAM (Security Account Manager)

 The Security Accounts Manager is a database in the Windows operating system (OS) that contains user names and
passwords. SAM is part of the registry and can be found on the hard disk.

 This service is responsible for making the connection to the SAM database (Contains available user-accounts and
groups). The SAM database can either be placed in the local registry or in the Active Directory (If available). When
the service has made the connection it announces to the system that the SAM-database is available, so other
services can start accessing the SAM-database.

 In the SAM, each user account can be assigned a Windows password which is in encrypted form. If someone
attempts to log on to the system and the user name and associated passwords match an entry in the SAM, a
sequence of events takes place ultimately allowing that person access to the system. If the user name or
passwords do not properly match any entry in the SAM, an error message is returned requesting that the
information be entered again.

 When you make a New User Account with a Password, it gets stored in the SAM File.

 Windows Security Files are located at


 The moment operating system starts, the SAM file becomes inaccessible.

SRM (Security Reference Monitor)

 The Security Reference Monitor is a security architecture component that is used to control user requests to
access objects in the system. The SRM enforces the access validation and audit generation. Windows NT forbids
the direct access to objects. Any access to an object must first be validated by the SRM. For example, if a user
wants to access a specific file the SRM will be used to validate the request. The Security Reference Monitor
enforces access validation and audit generation policy.

 The reference monitor verifies the nature of the request against a table of allowable access types for each process
on the system. For example, Windows 3.x and 9x operating systems were not built with a reference monitor,
whereas the Windows NT line, which also includes Windows 2000 and Windows XP, was designed with an entirely
different architecture and does contain a reference monitor.

Windows user account architecture

 User account passwords are contained in the SAM in the Hexadecimal Format called Hashes.

 Once the Passwords converted in Hashes, you cannot convert back to the Clear Text.

Read More

How to Check The email is original or Not

No comments:

First of all let us see How email system is working over internet.
The email is sent on internet as shown in below picture

So Here The Sender i.e is sending a mail to so the sender will type the mail and click on
send button and the mail will go to will forward the mail over internet and the internet
will search the email ids server and send it to and the the will search for
the in their own database and then the mail will be forwarded to and when the XYZ user
login to their account they will see an email in their inbox which is from

Now How To send the fake mail

To send fake mail We need to Bypass the and both and directly send an email over
internet .
So for that we will use a .php script as php has a function mail(); which can send email to any one without the and directly delivering the mail to and then will search for the in
their own database and then the mail will be forwarded to and when the XYZ user login to their account
they will see an email in their inbox which is from

But actually the email is not sent byabc@server1.comto so it is a fake mail.

Now How to check When you receive such mail.

Step 1:- First of all open the mail.

Step 2:- Now Click on the downward arrow near reply button. and click on show original.

Now check for The received from field on the page opened.
and see who has sent you the email , here is the sender.
so in the received from field check that there must be microsoft.comand not any other thing.
this was fake mail as there was and so the mail is fake as there is no here.

If you know how to do it ,Then you must know how to prevent it...
Read More

What is A PHISHING attack ? And how to avoid it.....

No comments:


   The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to
scam the user into surrendering private information that will be used for identity theft.

   The Email directs the user to visit a Web site where they are asked to update personal information, such as
passwords and credit card, social security, and bank account numbers, that the legitimate organization already
has. The Web site, however, is Bogus and set up only to steal the User’s information.

Phishing scams could be

  Emails inviting you to join a Social Group, asking you to Login using your Username and Password.

  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.

  Emails containing some Information of your Interest and asking you to Login to Your Account.

  Any Email carrying a Link to Click and asking you to Login.

Prevention against Phishing

  Read all the Email Carefully and Check if the Sender is Original

  Watch the Link Carefully before Clicking

  Always check the URL in the Browser before Signing IN to your Account

  Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.
Read More

Control media players by gesture using webcam

No comments:
Now you can control media players by simple gestures using your webcam.........

A software named flutter comes with this feature and it is also absolutely free...... 

It is available for both windows and mac

You can download it from thier official site:-

Here are some of its great features.....

You can try it yourself . It is absolutely free...
Read More

How to Remove a Virus Using Command Prompt

No comments:
 Virus is a computer program that can copy itself and infect your computer. These viruses can spread via USB/flash drive or from one computer to other computer by few written codes. There are many antivirus software available to remove viruses from computer. But there are some viruses or suspicious files which can’t be removed by any antivirus software. Some suspicious files such as autorun.inf initiate all the viruses in pc. These files must be removed for safe operation of your pc, because they may lead to data loss, software damages etc. Such viruses and files can be removed by using cmd. In this article we will discuss how to remove a virus using command prompt. Following steps can be used to remove a virus using command prompt from your computer.

  •    Go to start menu and type “cmd” in the search box or Start>all programs>accessories>command prompt.


  • Open the infected drive such as write , g: to go to G drive.
  • Now type dir/w/a . It will show all the files of the drive including hidden files.


  • Locate AUTORUN.INF or any Virus and other suspicious files in the directory.


there was no virus in my drive so only autorun.inf is been highlighted.

  • Type command attrib  -r –a –s –h to remove attributes of corresponding file.


  • Now type del virus name.exe t delete it, eg : del newfolder.exe .
(You can also delete viruses by using following steps:
  • When you find an Autorun.inf file or any other unusual .exe file just rename it.

Syntax for rename is (rename filename.extension new name ,  for example: (rename autorun.inf virus) to rename autorun.inf file. Here I have renamed it by “virus”.

  • Now you can access the defected drive without affecting the virus.
  • To delete the renamed file go to the defected drive and select the file you renamed.

Now delete the harmful renamed files.)
You have deleted that virus successfully but sometimes virus resides in the Recycler folder.To locate this folder:

  • Type cd recycler command.

  • Again type dir/w/a  to locate all file of the folder.
  • Identify malicious files and delete them using above commands.
Follow the above steps carefully and i think this information is enough to remove a virus using command prompt easily.
Important: Make sure that no other processes being running while performing these actions. Best of luck.

Type del autorun.inf to delete autorun.inf file.

Read More

How to Change Processor Name Permanently

No comments:
It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-

Steps :-

1.  Open Notepad.

2.  Copy and paste the exact code given below:-

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]"ProcessorNameString"="My Processor name 50000MHz"

To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.

4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.


5.   Copy the created Shortcut file.

6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or toC:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.)  if C: is your System drive.

7.  Paste the copied file.

This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time. So, even upon restarting your computer, you will see that the changed processor name is permanent.

Read More

How to Trace Any IP Address


How to Trace the IP Address Back to the Source?

In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is
Just go to and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:

  • Country in which the IP is located
  • City to which the IP address belongs to
  • Latitude/Longitude of the IP’s location
  • Zip Code of the region to which the IP belongs to
  • Time Zone associated with the IP
  • Name of the ISP to which the IP address belong to
  • Internet Speed of the computer associated with the IP
  • Weather Station associated with the region of the IP
  • Domain name associated with the IP address
A sample snapshot of the results from is given below:

You can also visually trace route any IP address back to its location. For this, just visit and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination.
Read More

How to Set a Video as Your Desktop Wallpaper with VLC

No comments:
Are you tired of static desktop wallpapers and want something a bit more entertaining? Today we’ll take a look at setting a video as wallpaper in VLC media player.
Download and install VLC player. You’ll find the download link below. Open VLC and select Tools > Preferences.


On the Preferences windows, select the Video button on the left.


Under Video Settings, select DirectX video output from the Output dropdown list.


Click Save before exiting and then restart VLC.

Next, select a video and begin playing it with VLC. Right-click on the screen, select Video, then DirectX Wallpaper.

sshot-21 copy

You can achieve the same result by selecting Video from the Menu and clicking DirectX 

sshot-19 copy

If you’re using Windows Aero Themes, you may get the warning message below and your theme will switch automatically to a basic theme.

After the Wallpaper is enabled, minimize VLC player and enjoy the show as you work.


When you are ready to switch back to your normal wallpaper, click Video, and then close out of VLC.

           sshot-24 copy

Occasionally we had to manually change our wallpaper back to normal. You can do that by right clicking on the desktop and selecting your theme.



This might not make the most productive desktop environment, but it is pretty cool. It’s definitely not the same old boring wallpaper!

Read More