Skip to main content

Posts

How to Activate 'God Mode' on Windows 7 and 8

Maybe you have heard about ‘God Mode’, something that allows you to access all sorts of settings you normally can’t see or find in Windows 7 or 8? It's literally your control panel on steroids. There are programs to do this for you (we will get to this in a minute) but it also very easy to activate yourself in less than a minute. Here’s how:

Step 1: Right click on your desktop and select New, Folder. See screenshot below showing how it will appear:



Optionally, if you don't want a desktop icon you can create a new folder in your C: drive by using either Windows Explorer or My Computer and simply right click on C: and select New, Folder. You can then access it there anytime.

Step 2: Copy and paste this for the new folder name:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

See screenshot below:



Step 3:

The folder will now be a shortcut to 'God Mode' on your desktop. See screenshot below.




When you click it, you will find tons of hidden settings you can modify. See screenshot belo…

How to Prevent Your Computer from Overheating (and Why It's Important)

Keeping your computer running within safe temperatures is important, especially as the temperature rises outside. Here's how to make sure your computer's not overheating—and how to fix it if it is.
The cooling system of your computer is one of the most important features of the device. Without the cooling system, the electrical components of your computer wouldn't be able to function; overheating would damage the integral parts of what makes your computer work. The heat has to be dissipated in order to keep everything working within safe operating temperatures


Why an Overheated Computer Is Dangerous Simply put, if your computer becomes too hot, it is possible to destroy and shorten the lifespan of the hardware inside your computer, leading to irreparable damage and potential data loss. Besides losing your data, heat pecks away at your computer's internal organs—the motherboard, CPU, and more—significantly shortening its lifespan. Besides the most obvious reason to keep …

How to hide any folder or files in android without any third party software

Stuffs You're Gonna Need:
A working android device.A File Manager (default).Few fingers to work with.A Goat (optional).

First of all switch on your phone and unlock it . Now open your file manager. For this tutorial, I'm using the default file manager of Galaxy Y.

Next go to your file manager settings and look for the term, Show Hidden Files/Folders. And enable/mark it as shown in the figure below. Then save your settings.


Now rename the existing folder you want to hide or create a new one.While renaming the folder just add an extra dot (.) right before all the characters. And save it. Refer to the following screenshot for better understanding.

After that go to the file manager settings again and disable/unmark Show Hidden Files/Folders option. You're all done. The files at the folder will not be viewable at Gallery.

Windows Security

Security Architecture of Windows  There are three components of Windows Security:  LSA (Local Security Authority)  SAM (Security Account Manager)  SRM (Security Reference Monitor)

LSA (Local Security Authority)  LSA is the Central Part of NT Security. It is also known as Security Subsystem. The Local Security Authority or LSA is a key component of the logon process in both Windows NT and Windows 2000. In Windows 2000, the LSA is responsible for validating users for both local and remote logons. The LSA also maintains the local security policy.
 During the local logon to a machine, a person enters his name and password to the logon dialog. This information is passed to the LSA, which then calls the appropriate authentication package. The password is sent in a nonreversible secret key format using a one-way hash function. The LSA then queries the SAM database for the User’s account information. If the key provided matches the one in the SAM, the SAM returns the users SID and the S…

How to Check The email is original or Not

First of all let us see How email system is working over internet.
The email is sent on internet as shown in below picture


So Here The Sender i.e abc@server1.com is sending a mail to xyz@server2.in. so the sender will type the mail and click on
send button and the mail will go to SERVER1.com whereSERVER1.com will forward the mail over internet and the internet
will search the xyz@server2.in email ids server and send it to SERVER2.in and the the SERVER2.in will search for
the xyz@server2.in in their own database and then the mail will be forwarded to xyz@server2.in and when the XYZ user
login to their account they will see an email in their inbox which is from abc@server1.com.
Now How To send the fake mail To send fake mail We need to Bypass the abc@server1.com and SERVER1.com both and directly send an email over
internet .
So for that we will use a .php script as php has a function mail(); which can send email to any one without the
SERVER1.com and directly delivering the mail to SER…

What is A PHISHING attack ? And how to avoid it.....

Phishing   The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to
scam the user into surrendering private information that will be used for identity theft.

   The Email directs the user to visit a Web site where they are asked to update personal information, such as
passwords and credit card, social security, and bank account numbers, that the legitimate organization already
has. The Web site, however, is Bogus and set up only to steal the User’s information.





Phishing scams could be
  Emails inviting you to join a Social Group, asking you to Login using your Username and Password.

  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.

  Emails containing some Information of your Interest and asking you to Login to Your Account.


  Any Email carrying a Link to Click and asking you to Login.




Prevention against Phishing
  Read all the Email Carefully and Check if the Sender is Original

  Watch the L…

Control media players by gesture using webcam

Now you can control media players by simple gestures using your webcam.........
A software named flutter comes with this feature and it is also absolutely free...... 
It is available for both windows and mac
You can download it from thier official site:- https://flutterapp.com/
Here are some of its great features.....





You can try it yourself . It is absolutely free...

How to Remove a Virus Using Command Prompt

Virus is a computer program that can copy itself and infect your computer. These viruses can spread via USB/flash drive or from one computer to other computer by few written codes. There are many antivirus software available to remove viruses from computer. But there are some viruses or suspicious files which can’t be removed by any antivirus software. Some suspicious files such as autorun.inf initiate all the viruses in pc. These files must be removed for safe operation of your pc, because they may lead to data loss, software damages etc. Such viruses and files can be removed by using cmd. In this article we will discuss how to remove a virus using command prompt. Following steps can be used to remove a virus using command prompt from your computer.
   Go to start menu and type “cmd” in the search box or Start>all programs>accessories>command prompt.



Open the infected drive such as write , g: to go to G drive.Now type dir/w/a . It will show all the files of the drive includin…

How to Change Processor Name Permanently

It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the windows start up folder. To do so, just follow the steps given below:-
Steps :-
1.  Open Notepad.

2.  Copy and paste the exact code given below:-

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]"ProcessorNameString"="My Processor name 50000MHz"

To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Please open Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.

4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the locatio…