Tuesday, 14 August 2018

what is Phishing?

phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information.

How to identify a phishing e-mail.

  1. Company - These e-mails are sent out to thousands of different e-mail addresses and often the person sending these e-mails has no idea who you are. If you have no affiliation with the company the e-mail address is supposedly coming from, it is fake. For example, if the e-mail is coming from Wells Fargo bank but you bank at a different bank.
  2. Spelling and grammar - Improper spelling and grammar are almost always a dead giveaway. Look for obvious errors.
  3. No mention of account information - If the company were sending you information regarding errors to your account, they would mention your account or username in the e-mail. In the above example, the e-mail just says "eBay customer", if this was eBay they would mention your username.
  4. Deadlines - E-mail requests an immediate response or a specific deadline. For example, in the above example, the requirement to log in and change your account information within 24 hours.
  5. Links - Although many phishing e-mails are getting better at hiding the true URL you are visiting, often these e-mails will list a URL that is not related to the company's URL. For example, in our above eBay example, "http://fakeaddress.com/ebay" is not an eBay URL, just a URL with an "ebay" directory. If you are unfamiliar with how a URL is structured, see the URL definition for additional information.

                                                                                 source:Computer Hope

Know to RJ-45 and making networking cable

Registered Jack-45, an RJ-45 is an 8-pin connection used for Ethernet network adapters. This connector is most commonly connected to the end of Cat5cable, which is connected between a computer network card and a network device such as a network routerThese connectors can be purchased at most electronic stores and computer stores. get more than you think you need.

next topics are how to make a network cable


  1. Cat5, Cat5e, Cat6, or Cat7 cable - This cabling can be purchased in large spindles at stores that specialize in cabling. Cat6 cabling is the most commonly used cable used today for networks.most network cables consist of a green, blue, orange, and brown pair of cables.
  2. There are two cable standards T568A and T568B, each twisted-pair. If you want to create a straight-through cable, both ends of the cable should be identical and should match the T568A. If you want to create a crossover cable, one end of the cable should match T568A and the other should match T568B.
  










Speed up Windows 10

Turn off shadowing and visual effects

To turn off these resource draining features, follow the steps below.
  1. In the Search Windows text box, next to the Start button on the taskbar, type sysdm.cpl and press Enter.
  2. In the System Properties window, click the Advanced tab.
  3. On the Advanced tab, click the Settings button in the Performance section.
  4. In the Performance Options window, select the Adjust for best performanceoption, then click the OK button.

Tuesday, 20 March 2018

How To visible all Files Infected by Shortcut Virus from USB Pendrive


    Just follow these steps ...........

  • Open My Computer.
  • Click on Tools option at the Top menu. Select Folder Options…
  • It will open a new window. Click on View tab.
  • Now, scroll down and look for the following option: Hidden files and folders. Under it, mark a check on Show hidden files and foldersoption.
  • Then just under it, you will see the following option: Hide protected operating system files (Recommended). Uncheck it.
  • Click on OK button.
  • That’s it. You’re done. Now, open your Pendrive and notice that all your files is visible now. However, it will not remove the shortcut virus but it will make all your files accessible.

thanks friends................

What is .SCR Virus? & How to remove it?

.SCR is precisely a type of file extension. It is a file-type which normally runs a Trojan-oriented script. Trojan is a very dangerous virus and can harm your computer badly. The .SCR Virus usually gets infected along with malicious screen saver, exe files, ZIP files, double extension files, etc.
The most worrying thing about this .SCR Virus is it does not get removed by many antiviruses as it is a write-protected file extension. 



So, to fix this problem, you need to manually delete this virus to protect your PC from malicious threads. But, there is small trick which you need to perform while you try to Remove .SCR Virus From Computer.

  • At first, boot your computer as Safe Mode.
NOTE: The process to boot your computer as Safe Mode can be different in your case. F8, key is used in majority of computers. 

  • Once you computer gets started as Safe Mode, navigate to C:\Windows\SystemNOTE: Here C:\ is your OS directory. If you have installed your operating system in another directory, replace it with that directory.

  • Here, search for the file named WINLODR.SCR and then permanently delete it.

  • Now, restart your computer as normal mode. You will see your problem is solved now.

How to recover deleted data with Wondershare Data Recovery

wondershare data recovery  click here to download it..........

  • Once you download it, install it on your PC. 
  • You will now see a shortcut of Windows Recovery software on your desktop. Click on it to open it.
  • Now, click on the requisite option depending on your need (You can register for the full version or try the trial version).
  • Move forward with the on-screen instructions and wait for some time until the whole process completes.
  • That’s it. You’re done. Select the type of Recovery (Recovery Modes). You can now see the files which have been deleted and the status of recovery possibility. Select the files and click on Recover button.

You can recover your deleted data regardless of the time period as long as the original lost data has not been overwritten by new data.

How To Compress BIG File (GB) upto SMALL File (MB) using *KGB Archive*

Useful Features of KGB Archiver:


  • It is available for free.
  • It is small in size and is easy to install.
  • It can compress a file at an efficiency rate of about 90%.
  • You can choose the compression rate according to your need.
  • You can save the compressed file using many extensions.
  • It does not affect the quality of the file.
  • You can easily decompress the file using the KGB Archiver itself.
  • It supports .kgb and .zip file formats.
  • It has almost 10x compression level.



KGB Archive click this link to download



Let’s now talk about How To Compress?????


  • launch KGB Archiver.
  • Choose Compress files option and click on Next.
  • Set the Destination directory, Archive format and Compression Level. Then, click on Add file button to add the required file and press the Next button.
  • Now, wait for some time until the compressing process completes. 

How To Compress Big File Into Smallest Size With WinRar



*WinRar have a special function where you can compress any files into a really small size file.*


             follow these steps given below:-

STEP 1:- 
Right Click or highlight any file that you want to compress.

STEP 2:- 
Click on Add to archive...

STEP 3:-
In Compression method, choose Best.

STEP 4:-
-In Archiving options, tick Create solid state archive and Lock archive.


STEP 5:-
-Click OK button and wait till it finish .



General PC Tips

  Adjust any setting on your PC with the Windows “God Mode” folder, which is a centralized Control Panel for all the OS settings. Access thi...