Latest Post

Thank you lot for showing your involvement inwards writing for , a applied scientific discipline spider web log on software, cyberspace in addition to safety tricks in addition to tips.

Update: See the novel guidelines.

What tin I write about?

Anything that helps someone is expert content for a invitee post. It tin hold upward related to software, spider web applications, internet, security, gadgets, tricks, tips, games, blogging, seo in addition to it tin hold upward based on your personal experiences equally well. There is no recommended length of the invitee post, but ordinarily a post must hold upward long plenty to enable a reader to empathise your article clearly.

Why should I write? What create I become far return?

You volition larn recognition, promotion, backlinks in addition to lineament traffic to your spider web log or website. Regular writers tin bring together this spider web log equally co- Authors in addition to larn many to a greater extent than incentives.

Guidelines
  1. Your post should hold upward master copy in addition to should non convey been published anywhere on whatsoever website.
  2. You tin include links at the halt of your post. Your links should only be to your homepage in addition to must non incorporate SEO'd anchor text.
  3. Always accompany your post amongst images.
How create I submit an article?

You may shipping your article at tweakandtrick@gmail.com. Please include the HTML formatted version of your post equally a .doc,.docx,.rtf  attachment. Within three days of receiving the email, I volition larn dorsum to you. For whatsoever farther queries, you lot tin contact me.

Common problems alongside FolderProtector as well as their solution


1) I bring forgotten my password

As at that spot is no means to stimulate upwards one's heed that y'all are the mortal who originally installed the software, nosotros cannot assistance you. The exclusively means to avoid this is to piece of employment a memorable password as well as adding a hint that may assistance y'all recall the password.

2) FolderProtector would non unlock files

Check if whatever safety software is blocking FolderProtector. Try running FolderProtector every bit an Administrator. Restarting your PC could besides solve this.

If SecuredFILES folder already exists on the Desktop, assay renaming it.

You tin besides assay unlocking your folder inwards safe mode.

If all else fails, connect your difficult disk to a Linux based reckoner as well as search for your data.

For other problems: See this post to know how the plan works.

Most of us bring individual data. Not all of us bring a individual reckoner to proceed that data. So, nosotros simply terminate upward amongst other people viewing that data. Although password protecting software practice work, it is close useless to enshroud individual information amongst these software(because nosotros are ever questioned every bit to what it is that nosotros are hiding amongst the attention of these software).

Hidden folders practice non function every bit anyone tin role Folder Options to brand a hidden folder visible. So, nosotros postulate an option means to practice hidden password protected folders which exclusively nosotros tin access. And that is just what nosotros volition larn inwards this post.

With this trick, y'all tin practice a secure password protected folder inwards Windows which no 1 except y'all tin access. To role this trick, follow the instructions given below:-

1.  Open Notepad.
2.  Copy as well as glue the exact code given below:-

cls
@ECHO OFF
championship www.tweakandtrick.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are y'all certain to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== www.tweakandtrick.com goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto terminate
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


 Not all of us bring a individual reckoner to proceed that information Password Protect folders inwards Windows without whatever Software


3.  Click on the File Menu. Click on Save As.
4.  Select All Types inwards the Save As Type dropdown menu. Save the file every bit *.bat or Locker.bat.


After creating the file, double click on the Saved file. Influenza A virus subtype H5N1 novel folder volition live on created. Enter your information inwards the folder. Again, double click on the batch file. Type Y as well as press Enter. The folder volition live on hidden from view.

To re-view your folder, double click on the saved batch file. Enter password every bit "www.tweakandtrick.com" without quotes as well as press Enter key. This is every bit good the default password. Your folder volition live on visible again.

To modify the default password, edit the business office of the code given inwards bluish as well as travel into your ain password.

Update: Try our new Folder Lock for a to a greater extent than secure means of locking folders.

The overall usability of this fob tin live on improved yesteryear deleting the batch file later hiding your folder as well as re-creating it when y'all wishing to access your folder again.

If y'all appear upward whatever occupation using this trick, y'all tin write a comment as well as I volition practice my best to attention you.

Note: This industrial plant on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP as well as Vista. First endeavor this on useless information to live on certain as well as and therefore exclusively enshroud your personal data.

This category consists of articles published on related to PC as well as cyberspace security.

This category consists of articles published on  related to PC as well as cyberspace Security

Tutorials as well as Tips


  1. Enable Task Manager disabled past times Administrator or Virus inwards Windows
  2. Know if your PC is infected alongside Viruses, Trojans or other Malware
  3. Install / Boot Windows from Pen drive/ Flash drive
  4. How to Reveal, Show, View Passwords hidden nether Asterisks/Stars 
  5. Enable Regedit/Registry Editor Disabled past times Administrator or Virus
  6. How to Improve Cyber Security
  7. PC Security Tips : Make your Computer Secure
  8. Disable/ Block USB ports on Windows XP, seven & Vista PC via Registry
  9. Show Administrator Account on Welcome Screen inwards Windows XP, seven as well as Vista
  10. Stay Safe: How to Shop Online Safely?
  11. 5 Storage Models as well as their Most Glaring Vulnerabilities


Enhancements

  1. Recover Windows Passwords With Free Password Recovery Tools
  2. Password Protect/ Lock folders inwards Windows without whatever Software
  3. Make Undeletable, Unrenamable Folders

Most of us honor ourselves inwards situations where a website nosotros want to catch is blocked past times a software or past times our Internet service provider (Internet Service Provider). So the inquiry arises, how tin nosotros access blocked websites? The answer to this is simple: Proxy websites. Before going into details, allow us know a fleck most these proxy websites. 

Proxy Websites

A proxy website acts every bit an intermediate rootage betwixt the user in addition to server the site beingness contacted is hosted on. Users ship requests to proxy websites which conveys them to the site's server. The answer received past times the proxy website is in addition to hence forwarded to the user's computer. This gives an impression to ISP's in addition to blocking software that the user is visiting the proxy website but inwards reality, s/he is visiting the site which was blocked. Thus, proxy servers besides render extra safety to users past times hiding their online activities from their ISP's.

Most of us honor ourselves inwards situations where a website nosotros want to catch is blocked past times a s How to Access Blocked Websites, View Restricted Sites

Commonly Blocked Web Sites

The sites which are most unremarkably blocked at workplaces, schools in addition to offices include websites similar Facebook, Orkut, Blogger (blogspot), Google News, Typepad, eBay, MySpace, YouTube, MSN, Yahoo! Messenger, Bebo, Google Talk, Gmail, Photobucket, AOL AIM, Flickr, Twitter etc. In around countries, social bookmarking sites similar Digg in addition to Reddit are besides blocked. Countries similar Saudi Arabia, Pakistan, mainland People's Republic of China choose fifty-fifty blocked access to mainstream media websites similar The New York times. H5N1 proxy website tin live on used to easily access these blocked websites. As proxy websites shroud a user's location, they tin besides live on used to access pop websites which are restricted to especial countries in addition to block users from other countries from visiting them.

Types of Proxies

There are 2 types of proxies. First, in that location are spider web proxies which choose an interactive interface; in addition to second, the proxy servers which tumble out the footing of IP Addresses in addition to port numbers. Proxies tin besides live on segregated on the footing of anonymity into Anonymous, Transparent in addition to High Anonymous depending upon the total of privacy they provide.

How to Find Proxy Websites in addition to Proxy Servers

A elementary Google search containing the give-and-take "proxy websites" is probable to render a lot of useful results. However, most of them are probable to live on lists containing proxy servers which you lot tin setup using their IP Address in addition to Port Number. So, inwards lodge to honor interactive proxy websites, you lot volition choose to search for something similar "Facebook Proxy Server" or "Twitter Proxy Server". H5N1 search similar this is most probable to render interactive proxy websites amongst which you lot tin access your blocked website past times only entering the URL inwards URL field. If you lot desire additional security in addition to anonymity, you lot tin opt for a paid proxy server.

Most of us honor ourselves inwards situations where a website nosotros want to catch is blocked past times a s How to Access Blocked Websites, View Restricted Sites

How to Setup Proxy Servers using their IP Address

If you lot want to catch your blocked website using a spider web proxy, you lot produce non need whatsoever setup. However, if you lot want to role a proxy server that tin alone live on accessed past times using its IP address in addition to port number, you lot must configure your browser to role it. Follow the instructions given below to setup this type of proxy inwards your browser:-

Google Chrome in addition to Internet Explorer Users

Google Chrome uses the same network settings every bit Internet Explorer. So, inwards lodge to configure Google Chrome to role a proxy server, you lot choose to configure Internet Explorer. You tin configure a proxy server inwards Internet Explorer past times next the instructions given below:-

  1. Start Internet Explorer.
  2. Click on Tools, Internet Options.
  3. Click on Connections Tab, select your Network Connection in addition to click on Settings.
  4. Check on Use a Proxy Server for this Connection.
  5. In the Address field, add together the IP Address of your Proxy server. In the Port field, larn into the Port Number.
  6. Click on OK in addition to OK again.

Mozilla Firefox Users

Mozilla Firefox users tin configure their browser to role a proxy past times next the instructions given below:-

  1. Start Mozilla Firefox.
  2. Click on Tools, Options.
  3. Click on Advanced Tab.
  4. Click on Network tab.
  5. Click on Settings.
  6. Encircle Manual Proxy Configuration.
  7. Enter the IP Address in addition to Port Number at the appropriate place. In most cases, it volition live on a HTTP server.  
After you lot choose successfully configured your browser to role the proxy server, you lot volition live on able to access blocked websites whenever you lot browse the network amongst your browser.

Related - Ways to Access Blocked Websites

"Meet Epic. Your New Best Friend." says the opening lines of the webpage at EpicBrowser.com as well as I exercise non totally disagree. Epic Browser is the showtime browser with the made inwards Bharat tag as well as which proudly says that it is made for Indians. Epic has left the meridian browsers similar Google Chrome as well as the master Mozilla Firefox tasting the dust inwards price of security.

Moreover Epic Browser is totally free. Although its focus is on Indian Consumers, users from other countries volition every bit good discovery it useful. Epic Browser is the showtime production of the Bangalore based software companionship HiddenReflex.

About HiddenReflex: From the browser's well-nigh us Page, " Hidden Reflex is a software production startup founded past times Alok Bhardwaj inwards 2007 as well as based inwards Bangalore. Alok, who was raised inwards the U.S., was inspired past times the success of opened upward source software as well as spider web 2.0 innovations."

 says the opening lines of the webpage at EpicBrowser Epic Browser: The safest, intuitive agency to browse the web

 Features
  1. Based on stone corporation foundation of Mozilla Firefox 3.6.6. What else exercise you lot need? Influenza A virus subtype H5N1 totally customizable version of Firefox as well as definitely to a greater extent than security than it. All the features of Mozilla as well as more.
  2. Tweaked for improved speeds. I convey personally flora the Epic Browser performing improve inwards rendering pages than master Mozilla Firefox 3.6.6. Both browsing as well as downloading were flora to endure faster on the same meshing connecter than Mozilla Firefox.
  3. Built In Anti-virus: Epic Browser is the world's showtime anti-virus browser with integrated Eset Nod32 anti-virus( considered to endure alongside the safest security products) which you lot tin role to scan your whole organisation afterwards downloading virus definitions of well-nigh 25 Mb. Unlike lawsuit versions of anti-viruses, you lot tin role epic anti-virus to kill the viruses it finds.
  4. Malicious Website Warnings: Epic warns you lot whenever you lot are going to catch a malicious website.
  5. Anti Phishing Protection: Epic shows a big bolded domain advert then you lot tin never confuse google.com to a scammy googlescam.com.
  6. You instruct latest cinema songs, alive cricket scores, intelligence from leading sources similar rediff.com, regional as well as hindi news, alive tv, stock quotes, events, videos as well as a daily joke inwards the Epic Sidebar.
  7. Epic offers 1 click individual information deletion, 1 click individual browsing, flash cookie deletion as well as fifty-fifty no browsing records for those worried well-nigh Privacy( Mozilla as well as Opera shop what you lot search on search engines.).
  8. Sidebar: The epic sidebar is a precious stone inwards its own. It contains links to Facebook, Twitter, Orkut, Gmail, Yahoo with alive updates to your feeds straight inwards the browser. So, you lot tin ever rest updated to your friends.You tin role the sidebar to discovery jobs, play games, brand a to exercise list, backup your difficult drive, start a timer as well as fifty-fifty download a customized app.
  9. What's more? Epic has integrated World Of Trust Search as well as rating with which you lot tin variety your results as well as take less trusted sites.
  10. Epic automatically display an selection to persuasion cached versions of non flora pages from iii sources. Google, Wayback as well as Coral.
  11. If you lot don't similar the included skin, you lot tin ever download a pare anytime. Note: When you lot start Epic for the showtime time, it downloads the default skin. So the lag inwards speed should inwards no agency associated to the browser.
  12. You tin role Epic to type easily inwards Indian languages using Epic Indic Text.
  13. Epic has an integrated Word Processor with which you lot tin easily exercise documents. So forget other WordProcessors.

Download Epic Browser: You tin download Epic browser from EpicBrowser.com.

Safest undoubtedly it is, Epic is non totally bug-less. The most mutual work is that it re-downloads its subject afterwards every few days. Overall , Epic is a characteristic rich browser with loads of potential. If HiddenReflex plant on it well, Epic tin easily buy the farm the best spider web browser inwards the market. 

For to a greater extent than such keen freewares, catch our Freewares Section.

We all want to travel popular. But unfortunately, getting pop is non together with hence slow inwards the existent world. However, inwards the cyber globe of which nosotros all are business office of, it is non together with hence tough if you lot follow around tips given below. Now what are you lot waiting for? Bring your pen together with newspaper commencement taking notes on how to boot the bucket famous.

1.  Start a Website: You powerfulness remove maintain heard the cliche, "everyone pop has a website." But fortunately, you lot don't remove maintain to travel famous to remove maintain a website. You tin dismiss remove maintain your website made from a specialist or tin dismiss teach inwards yourself. Just select a theme you lot like, teach your pen...err... keyboard ready together with commencement creating killer content for which people would come upwardly dorsum i time to a greater extent than together with again.

2.  Start a Blog: Some bloggers are ridiculously famous. No affair what they write, people similar it together with commencement praising them. Although such wizardry would remove maintain no argue inwards the existent world, the cyber globe has a argue for everything. To boot the bucket i such pop blogger, the basic thing required is killer content. The instant most of import thing is existence regular inwards posting articles, together with in all likelihood the most of import thing required is humility. You tin dismiss remove maintain your self hosted weblog or select whatever of the costless weblog hosting platforms. The 2 leading ones are Blogger together with WordPress.

Related: What is a Blog?

3.  Join Facebook: Facebook is the instant most visited website on the meshing later Google. Almost everyone is on Facebook. Having together with hence much traffic each twenty-four hours makes Facebook a potential advertising target. Just bring together Facebook, add together everyone you lot know every bit a friend together with also add together the friends of your friends to your friends list.

Create a Facebook fan page together with add together a link to your website together with weblog on it. Observe what people similar on Facebook together with commencement a postathon of posting such articles. 'Like' other people's posts together with hand genuine comments on them. There is a proficient gamble that they powerfulness teach to your fan page together with commencement next you.

Also:Why Facebook Uses Blue Color?

 getting pop is non together with hence slow inwards the existent globe Get Popular on the Internet

4.  Join Twitter: Twitter helps you lot part the latest buzz on the internet. Everyone well-known is on Twitter. Be it Tom Cruise or Sachin Tendulkar, Twitter has left no i untouched. So why shouldn't you lot travel on Twitter too? Join Twitter together with commencement next people. It is to a greater extent than than probable that they volition follow you lot inwards return. Be controversial precisely exclusively to a limit. Moreover, tweet on whatever latest buzz you lot powerfulness encounter on the internet. e.g. Octopus Paul was the fairly pop on the meshing inwards World Cup 2010. Influenza A virus subtype H5N1 lot to a greater extent than than many people tweeted nearly it. Most of them are pop on the internet.

5.  Join Social Networking Sites: Aside from Twitter together with Facebook, bring together all the social networking sites you lot tin dismiss intend of. Try to travel an active fellow member of the community together with remove maintain business office inwards discussions. People volition eventually commencement liking you lot together with volition travel pulled to click on your profile. Have an amazing profile together with practise non forget to add together a link to your website, blog, Facebook fan page together with Twitter account.

6.  Join Forums: Be helpful inwards forums. Welcome novel members together with don't discourage newbies. Always encourage them together with scream upwardly that in that place are people on the other side of your estimator reading what you lot are typing. If you lot practise all this, people volition experience that they are nether a charm together with volition click on your profile. Again don't forget to add together a link to your website, blog, Twitter describe concern human relationship together with Facebook fan page inwards your profile.

7.  Your Profile:  Having a good written profile for uploading inwards social networking sites, your weblog together with website volition attention brand you lot notorious much sooner. Remember to remove maintain a descriptive profile, amongst a slight comic touch. People volition praise your profile together with volition travel attracted to you lot similar bears to honey.

8.  Start Commenting: Give intelligent comments on other blogs/websites amongst a link to your website/blog. But scream upwardly non to hand spammy comments followed past times a link. Use the Name/URL champaign to hand a link. Try to right other blogs together with propose improvements inwards the posted articles precisely scream upwardly non to boot the bucket likewise much of a corrector. People don't similar such commentators.

I am pretty certain that if you lot follow all of the suggestions given above, you lot volition also boot the bucket pop on the meshing inwards no fourth dimension together with would also bring together the elite grouping of famous people.

    Have you lot always wondered how you lot tin brand a folder which neither tin hold out deleted nor hold out renamed. Well, if you lot have, thence you lot accept come upwards to the correct place. With this trick, you lot volition hold out able to practice folders inward Windows which cannot hold out renamed or deleted.

    Basic Concept
    The basic concept behind this play tricks is the purpose of Keywords. Keywords are reserved words inward whatever programming linguistic communication that cannot hold out used every bit names of variables. Windows likewise uses for certain keywords inward its programming. Some of them are con, aux, lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8 in addition to lpt9.

    Have you lot always wondered how you lot tin brand a folder which neither tin hold out deleted nor hold out renam Make Undeletable, Unrenamable Folders

    A Test
    To exam this concept, brand a novel folder inward Windows in addition to endeavor to rank it a yell same every bit whatever keyword mentioned above.

    Result
    Windows volition non rename your folder to whatever of the keyword given above.

    Trick
    So the interrogation arises, how tin nosotros brand a folder alongside a keyword every bit its name? The solution to this work is included inward Windows itself. As nosotros know that Windows has evolved from D.O.S.(Disk Operating System), its commands tin hold out used inward Windows. You tin purpose D.O.S. Programming inward Windows to practice a folder alongside a keyword every bit its yell using the steps given below:-

    1. Click on Start.
    2. Click on Run. Type inward "cmd" without quotes.
    3. In the Command Prompt Window that opens, type the yell of the displace you lot want to practice your folder inward the format <drive-name>: in addition to press Enter. e.g. If you lot want to practice the undeletable folder inward D drive, type "D:" without the quotes. Note that the folder cannot hold out created inward the rootage of C: displace (if C: is your organization drive).
    4. Type this command- "md con\" or "md lpt1\" without the quotes in addition to press Enter. You tin select whatever of the keywords given to a higher house every bit the yell of your folder.

    Now Windows volition practice an undeletable, unrenamable folder inward the displace you lot entered inward Step 3. However, the folder tin hold out renamed to simply about other keyword using Windows Explorer.

    Deleting the Folder

    Although, it is non possible to manually delete the folder, you lot tin delete the folder yesteryear typing "rd con\" or "rd lpt1\" inward Step 4 instead of "md con\" or "md lpt1\".

    Windows Compatibility: This industrial plant on Windows XP, Windows Vista, Windows 7, Windows eight in addition to Windows 8.1.

    Try it yourself to practice i such folder which tin neither hold out deleted nor hold out renamed.

    With this trick, yous tin disable access to your USB(Universal Serial Bus) ports on your Windows based PC to preclude people from taking out information without permission or spreading viruses through the role of USB (pen as well as flash) drives.

    To role this play a trick on to disable USB ports, follow the steps given below:-

    1. Click on Start.
    2. Click on Run. If yous cannot detect RUN, type it inward the search box.
    3. Type "regedit" without quotes. This volition launch the Registry Editor.
    4. Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
    5. In the operate area, double click on Start.
    6. In the Value Data box, live inward 4.
    7. Click on OK.
    8. Close Registry Editor as well as refresh your desktop.
    9. To re-enable access to your USB ports, live inward three inward the Value Data box inward Step 6.

     ports on your Windows based PC to preclude people from taking out information without permission  Disable USB ports on Windows PC via Registry

    Try it yourself to brand your PC invulnerable from information theft as well as malware which spread through USB ports. This plant on Windows 10, Windows 8, Windows 8.1, Windows seven as well as Windows XP.

    Note: This play a trick on too disables access to your USB connected peripheral devices. So, create non role it if yous accept USB connected keyboard as well as mouse.

    Contact Form

    Name

    Email *

    Message *

    Powered by Blogger.