Skip to main content

Posts

How to Activate 'God Mode' on Windows 7 and 8

Maybe you have heard about ‘God Mode’, something that allows you to access all sorts of settings you normally can’t see or find in Windows 7 or 8? It's literally your control panel on steroids. There are programs to do this for you (we will get to this in a minute) but it also very easy to activate yourself in less than a minute. Here’s how: Step 1 : Right click on your desktop and select New, Folder. See screenshot below showing how it will appear: Optionally, if you don't want a desktop icon you can create a new folder in your C: drive by using either Windows Explorer or My Computer and simply right click on C: and select New, Folder. You can then access it there anytime. Step 2 : Copy and paste this for the new folder name: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} See screenshot below: Step 3 : The folder will now be a shortcut to 'God Mode' on your desktop. See screenshot below. When you click it, you will find tons of hidden settings you can

How to Prevent Your Computer from Overheating (and Why It's Important)

Keeping your computer running within safe temperatures is important, especially as the temperature rises outside. Here's how to make sure your computer's not overheating—and how to fix it if it is. The cooling system of your computer is one of the most important features of the device. Without the cooling system, the electrical components of your computer wouldn't be able to function; overheating would damage the integral parts of what makes your computer work. The heat has to be dissipated in order to keep everything working within safe operating temperatures Why an Overheated Computer Is Dangerous Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer's internal organs—the motherboard, CPU, and more—significantly shortening its lifespan. Besides the most obvious rea

How to hide any folder or files in android without any third party software

Stuffs You're Gonna Need: A working android device. A File Manager (default). Few fingers to work with. A Goat (optional). F irst of all switch on your phone and unlock it .  N ow open your file manager. For this tutorial, I'm using the default file manager of Galaxy Y. N ext go to your file manager settings and look for the term,  Show Hidden Files/Folders . And enable/mark it as shown in the figure below. Then save your settings. N ow rename the existing folder you want to hide or create a new one.   While renaming the folder just add an extra dot (.) right before all the characters. And save it. Refer to the following screenshot for better understanding. A fter that go to the file manager settings again and disable/unmark  Show Hidden Files/Folders  option. You're all done. The files at the folder will not be viewable at Gallery.

Windows Security

Security Architecture of Windows  There are three components of Windows Security:  LSA (Local Security Authority)  SAM (Security Account Manager)  SRM (Security Reference Monitor) LSA (Local Security Authority)  LSA is the Central Part of NT Security. It is also known as Security Subsystem. The Local Security Authority or LSA is a key component of the logon process in both Windows NT and Windows 2000. In Windows 2000, the LSA is responsible for validating users for both local and remote logons. The LSA also maintains the local security policy.  During the local logon to a machine, a person enters his name and password to the logon dialog. This information is passed to the LSA, which then calls the appropriate authentication package. The password is sent in a nonreversible secret key format using a one-way hash function. The LSA then queries the SAM database for the User’s account information. If the key provided matches the one in the SAM, the

How to Check The email is original or Not

First of all let us see How email system is working over internet. The email is sent on internet as shown in below picture So Here The Sender i.e abc@server1.com is sending a mail to xyz@server2.in. so the sender will type the mail and click on send button and the mail will go to SERVER1.com whereSERVER1.com will forward the mail over internet and the internet will search the xyz@server2.in email ids server and send it to SERVER2.in and the the SERVER2.in will search for the xyz@server2.in in their own database and then the mail will be forwarded to xyz@server2.in and when the XYZ user login to their account they will see an email in their inbox which is from abc@server1.com. Now How To send the fake mail To send fake mail We need to Bypass the abc@server1.com and SERVER1.com both and directly send an email over internet . So for that we will use a .php script as php has a function mail(); which can send email to any one without the SERVER1.com and directly deliver

What is A PHISHING attack ? And how to avoid it.....

Phishing    The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.    The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is Bogus and set up only to steal the User’s information. Phishing scams could be   Emails inviting you to join a Social Group, asking you to Login using your Username and Password.   Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.   Emails containing some Information of your Interest and asking you to Login to Your Account.   Any Email carrying a Link to Click and asking you to Login. Prevention against Phishing   Read all the Email Carefully and

Control media players by gesture using webcam

Now you can control media players by simple gestures using your webcam......... A software named flutter comes with this feature and it is also absolutely free......  It is available for both windows and mac You can download it from thier official site:-  https://flutterapp.com/ Here are some of its great features..... You can try it yourself . It is absolutely free...

How to Remove a Virus Using Command Prompt

 Virus is a computer program that can copy itself and infect your computer. These viruses can spread via USB/flash drive or from one computer to other computer by few written codes. There are many antivirus software available to remove viruses from computer. But there are some viruses or suspicious files which can’t be removed by any antivirus software.  Some suspicious files such as autorun.inf initiate all the viruses in pc. These files must be removed for safe operation of your pc, because they may lead to data loss, software damages etc. Such viruses and files can be removed by using cmd. In this article we will discuss how to remove a virus using command prompt. Following steps can be used to remove a virus using command prompt from your computer.    Go to start menu and type “cmd” in the search box or Start>all programs>accessories>command prompt. Open the infected drive such as write , g: to go to G drive. Now type dir/w/a . It will show all the files

How to Change Processor Name Permanently

It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:- Steps  :- 1.  Open Notepad. 2.  Copy and paste the exact code given below:- Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor \0 ] "ProcessorNameString"=" My Processor name 50000MHz " To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0. 3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg. 4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the

How to Trace Any IP Address

How to Trace the IP Address Back to the Source? In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is  IP2Location.com . Just go to  http://www.ip2location.com/demo.aspx  and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address: Country  in which the IP is located City  to which the IP address belongs to Latitude/Longitude  of the IP’s location Zip Code  of the region to which the IP belongs to Time Zone  associated with the IP Name of the ISP  to which the IP address belong to Internet Speed  of the computer associated with the IP Weather Station  associated with the region of the IP Domain name  associated with the IP address A sample snapshot of the results from ip2loca