electrical theory and electrical fundementals for all electrical related people . students , engineers, electrician #electricaltheorems,electrical,
electrical theory and electrical fundementals for all electrical related people . students , engineers, electrician #electricaltheorems,electrical,
Thursday, 12 July 2018
itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'>
How was your place 15 Years ago ?
Tuesday, 8 May 2018
itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'>
Hide Your Chatting - Mask Chat
electrical theory and electrical fundementals for all electrical related people . students , engineers, electrician #electricaltheorems,electrical,
MASK CHAT
MaskChat - The Digital Curtain to Hide Chat from Onlookers, Shoulder-Surfer, Intruders, Trespassers.
MaskChat is a FREE unique digital Mask designed for android users to maintain privacy, while having a private conversation on their smartphones. Private Conversation could be chatting on WhatAapp, Tinder, Facebook Messenger, WeChat, SnapChat or any other chat network. One can even use it to hide screen while typing passwords or accessing confidential information like bank info.
What you can hide? :
-Hide WhatsApp chat
-Hide Snapchat
-Hide facebook browsing
-Hide WeChat
-Hide screen while typing passwords or accessing confidential information.
Hide Chats & Secure Phone from Onlookers, Peepers & your Boss who keeps an eye on your phone. Feel secure & secret chat in Metro, Train and public transport by Hide Whatsapp Chat, Facebook, Tinder, HitWe, Badoo, Woo, WeChat, SnapChat, Hike, imo, Skype, other secret chats. Watch Secret Videos on YouTube, Daily Motion.
Hide passwords & hide payment & finance apps with secure phone curtain.Curtain Hide Whatsapp Chat is FREE & NO NEED OF INTERNET Curtain Hide Chat is a tool to Beautify Screen & Hide Whatsapp chat & secret chat Curtain Hide Chat is a Mobile Curtain for all ages to maintain privacy, while having secret chats with their friends and families.
MaskChat is a FREE unique digital Mask designed for android users to maintain privacy, while having a private conversation on their smartphones. Private Conversation could be chatting on WhatAapp, Tinder, Facebook Messenger, WeChat, SnapChat or any other chat network. One can even use it to hide screen while typing passwords or accessing confidential information like bank info.
What you can hide? :
-Hide WhatsApp chat
-Hide Snapchat
-Hide facebook browsing
-Hide WeChat
-Hide screen while typing passwords or accessing confidential information.
Hide Chats & Secure Phone from Onlookers, Peepers & your Boss who keeps an eye on your phone. Feel secure & secret chat in Metro, Train and public transport by Hide Whatsapp Chat, Facebook, Tinder, HitWe, Badoo, Woo, WeChat, SnapChat, Hike, imo, Skype, other secret chats. Watch Secret Videos on YouTube, Daily Motion.
Hide passwords & hide payment & finance apps with secure phone curtain.Curtain Hide Whatsapp Chat is FREE & NO NEED OF INTERNET Curtain Hide Chat is a tool to Beautify Screen & Hide Whatsapp chat & secret chat Curtain Hide Chat is a Mobile Curtain for all ages to maintain privacy, while having secret chats with their friends and families.
Thursday, 8 February 2018
itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'>
cls
@ECHO OFF
title My Folder
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Secure goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Secure "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter the Password to unlock folder
set/p "pass=>"
if NOT %pass%== das goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Secure
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Secure
echo Secure created successfully
goto End
:End
Save as this file with .bat extension
Double click the .bat file
Double click the bat file and enter Y in command Window. That time your secure folder hide in system
How to Lock Folder in Windows without Any Software
electrical theory and electrical fundementals for all electrical related people . students , engineers, electrician #electricaltheorems,electrical,
HOW TO LOCK FOLDER IN WINDOWS
How to lock folder in windows without any help of Third party software. Just using command prompt code
Step 1:
Create a new text document
Right Click --New ----Text Document
Step 2:
Open Text file and Copy this below code and paste and change das to your password
cls
@ECHO OFF
title My Folder
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Secure goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Secure "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter the Password to unlock folder
set/p "pass=>"
if NOT %pass%== das goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Secure
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Secure
echo Secure created successfully
goto End
:End
Step 3:
Save as this file with .bat extension
Step 4:
Double click the .bat file
Step 5:
Save your secret files in new created folder SecureStep 6:
Double click the bat file and enter Y in command Window. That time your secure folder hide in system
Step 7:
Double click the bat file and enter your password and open your folder
Sunday, 21 January 2018
itemprop='blogPost' itemscope='itemscope' itemtype='http://schema.org/BlogPosting'>
Other requests come from people you have never heard from before. There are relatively few laws (though some countries do have them) preventing the secure exchange of viruses between consenting individuals, though it is clearly irresponsible for you simply to make viruses available to anyone who asks. Your best response to a request from an unknown person is simply to decline politely.
A third set of requests come from exactly the people you might think would be least likely to want viruses "users of anti-virus software". They want some way of checking that they have deployed their software correctly, or of deliberately generating a "virus incident in order to test their corporate procedures, or of showing others in the organisation what they would see if they were hit by a virus".
Using real viruses for testing in the real world is rather like setting fire to the dustbin in your office to see whether the smoke detector is working. Such a test will give meaningful results, but with unappealing, unacceptable risks.
Since it is unacceptable for you to send out real viruses for test or demonstration purposes, you need a file that can safely be passed around and which is obviously non-viral, but which your anti-virus software will react to as if it were a virus.
The file is a legitimate DOS program, and produces sensible results when run (it prints the message "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!").
It is also short and simple - in fact, it consists entirely of printable ASCII characters, so that it can easily be created with a regular text editor. Any anti-virus product that supports the EICAR test file should detect it in any file providing that the file starts with the following 68 characters, and is exactly 68 bytes long:
How to Test Antivirus to Your Computer
electrical theory and electrical fundementals for all electrical related people . students , engineers, electrician #electricaltheorems,electrical,
How to Test Antivirus
If you are active in the anti-virus research field, then you will regularly receive requests for virus samples. Some requests are easy to deal with: they come from fellow-researchers whom you know well, and whom you trust. Using strong encryption, you can send them what they have asked for by almost any medium (including across the Internet) without any real risk.
Other requests come from people you have never heard from before. There are relatively few laws (though some countries do have them) preventing the secure exchange of viruses between consenting individuals, though it is clearly irresponsible for you simply to make viruses available to anyone who asks. Your best response to a request from an unknown person is simply to decline politely.
A third set of requests come from exactly the people you might think would be least likely to want viruses "users of anti-virus software". They want some way of checking that they have deployed their software correctly, or of deliberately generating a "virus incident in order to test their corporate procedures, or of showing others in the organisation what they would see if they were hit by a virus".
Reason For Testing Antivirus
Obviously, there is considerable intellectual justification for testing anti-virus software against real viruses. If you are an anti-virus vendor, then you do this (or should do it!) before every release of your product, in order to ensure that it really works. However, you do not (or should not!) perform your tests in a "real" environment. You use (or should use!) a secure, controlled and independent laboratory environment within which your virus collection is maintained.
Using real viruses for testing in the real world is rather like setting fire to the dustbin in your office to see whether the smoke detector is working. Such a test will give meaningful results, but with unappealing, unacceptable risks.
Since it is unacceptable for you to send out real viruses for test or demonstration purposes, you need a file that can safely be passed around and which is obviously non-viral, but which your anti-virus software will react to as if it were a virus.
If your test file is a program, then it should also produce sensible results if it is executed. Also, because you probably want to avoid shipping a pseudo-viral file along with your anti-virus product, your test file should be short and simple, so that your customers can easily create copies of it for themselves.
The good news is that such a test file already exists. A number of anti-virus researchers have already worked together to produce a file that their (and many other) products "detect" as if it were a virus.
Agreeing on one file for such purposes simplifies matters for users: in the past, most vendors had their own pseudo-viral test files which their product would react to, but which other products would ignore.
The good news is that such a test file already exists. A number of anti-virus researchers have already worked together to produce a file that their (and many other) products "detect" as if it were a virus.
Agreeing on one file for such purposes simplifies matters for users: in the past, most vendors had their own pseudo-viral test files which their product would react to, but which other products would ignore.
Antivirus Test File
This test file has been provided to EICAR for distribution as the "EICAR Standard Anti-Virus Test File", and it satisfies all the criteria listed above. It is safe to pass around, because it is not a virus, and does not include any fragments of viral code. Most products react to it as if it were a virus (though they typically report it with an obvious name, such as "EICAR-AV-Test").
The file is a legitimate DOS program, and produces sensible results when run (it prints the message "EICAR-STANDARD-ANTIVIRUS-TEST-FILE!").
It is also short and simple - in fact, it consists entirely of printable ASCII characters, so that it can easily be created with a regular text editor. Any anti-virus product that supports the EICAR test file should detect it in any file providing that the file starts with the following 68 characters, and is exactly 68 bytes long:
Copy This Code
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Download Test File
Subscribe to:
Posts (Atom)