Pages

Showing posts with label Tips. Show all posts
Showing posts with label Tips. Show all posts

Saturday, March 16, 2013

how to remove write protection from pen drive


It says “The disk is write-protected”. So now what to do? Will that be permanent? Obviously not. You can remove write protection from USB drive by using some commands. We will use windows cmd console for typing these commands. So lets start.

How To Remove Write Protection From USB drive??

  • First open cmd by pressing WIN+R(Run) and then type cmd and press enter.
    Remove write protection from USB drive
  • Now you will see something like below (CMD console). Type diskpart and press enter. Like i have done.
    Remove write protection from USB drive
  • Diskpart will start now. Now type list disk and press enter. Refer image below.
    Remove write protection from USB drive
  • Now it will list the disks connected. You have to select disk 1.
    Type select disk 1 and press enter.
    Remove write protection from USB drive
  • Now we will remove write protection from usb drive.
    type attributes disk clear readonly and press enter.
    Remove write protection from USB drive
  • Sometimes after you have executed the command, you have to remove and reinsert the usb, to remove write protection successfully.
  • Now you have full access over your usb drive. You can copy,delete and modify all of its content,
In this way you have successfully remove write protection from USB drive. So its basically few commands. If you do it in the right way as mentioned above, then this method will definitely work out for you.

Source: Technofall

Sunday, November 11, 2012

How to Recover Lost Data : Using Nextbreed


How to recovery lost files and partitions with NextBreed Data Recovery?



NextBreed Data Recovery can recover deleted files and pictures from hard drives, flash disks, memory cards (like SD cards, MMC cards, etc.), as long as data is not repeatedly written over. You are allowed to salvage data lost from virus infection, mistaken deletion, formatting, wrong partition, etc. with accuracy.
The following step-by-step guide will show you how to use NextBreed Data Recovery to recover lost files and partitions. If you want to recover files from a formatted drive, please click on "Format Recovery". If you select "Raw Recovery", it will find more files for you, but will take more time in the scanning process.
After you run NextBreed Data Recovery, you will see the main user interface of the program.
NextBreed Data Recovery Screenshot-1
You should choose the recovery solution for your scenario. In this example I am using "Deleted Recovery" and "Partition Recovery" while writing this guide which you may use frequently.

Part 1: How to recover lost or deleted files.

Step 1 Click on the "Deleted Recovery" icon, you will enter the "Deleted Recovery" panel.

NextBreed Data Recovery Screenshot-2

Step 2 Select the hard drive where your lost data is located. Here I am using the D drive as an example.

NextBreed Data Recovery Screenshot-3

Step 3 Scan your lost files and list them.

NextBreed Data Recovery Screenshot-4
Tips:
(1)You can use the "Quick Search" option to find the lost or missing files quickly.
(2)You can check the "Use Filter" box to activate the Filter Option, with which you can specify a file type or file name.

Step 4 Recover the lost files.

NextBreed Data Recovery Screenshot-5
Select the files you want to recover and then click the "Recover" button. After you click the "Recover" button, it will pop up a dialogue box, and you can choose a path for the recovered files to be saved. Please do not save the files to the same location from where you are recovering.

Part 2 How to recover lost partitions

Step1. Select "Partition Recovery" button on the main interface. (Please note that Partition Recovery may cause damage to your partitions. Please use it carefully.)

NextBreed Data Recovery Screenshot-6
Click on "Partition Recovery" button, you will then enter "Partition Recovery" mode as follows (Assume your E drive has been lost).

NextBreed Data Recovery Screenshot-7

Step 2 Auto scan your computer drives.

NextBreed Data Recovery Screenshot-8
Double-click on "Auto Scan" option, and the software will automatically scan your computer and find the lost partition named (in this example) *.NTFS.

Step 3 Select the lost partition and recover it.

NextBreed Data Recovery Screen-9
Click on the lost partition named (in this example) *.NTFS, and there will be a pink identifier marking the deleted partition. Then, click on "Recovery" button to recover the lost partition. At this time, the following dialog box will pop out,  please click on "OK" button.

Step 4 Reboot your computer after the partition has been recovered.

After a short duration the lost partition will be recovered.  The software will then inform you to reboot your computer, please click on the "Yes" button.
NextBreed Data Recovery Screen-10
Re-open the software and you will notice the lost partition has been found.

Try it Now!

 Free Download NextBreed Data Recovery 7.30 MB

Source : http://www.nextbreed.com


Thursday, August 16, 2012

Backtrack r3 tutorials | Upgrade From BackTrack 5 R2 to BackTrack 5 R3

Backtrack r3 tutorials

 
Recently,  released the long-awaited BackTrack 5 R3 but for those of you who don’t want to start fresh with a new installation, have no fear because you can easily upgrade your existing installation of R2 to R3.
Our primary focus with this release was on the implementation of various bug fixes, numerous tools upgrades and well over 60 new additions to the BackTrack suite. Because of this, the upgrade path to BackTrack 5 R3 is relatively quick and painless.
First, you will want to make sure that your existing system is fully updated:
apt-get update && apt-get dist-upgrade
With the dist-upgrade finished, all that remains is the install the new tools that have been added for R3. An important point to keep in mind is that there are slight differences between the 32-bit and 64-bit tools so make sure you choose the right one.

32-Bit Tools

apt-get install libcrafter blueranger dbd inundator intersect mercury cutycapt trixd00r artemisa rifiuti2 netgear-telnetenable jboss-autopwn deblaze sakis3g voiphoney apache-users phrasendrescher kautilya manglefizz rainbowcrack rainbowcrack-mt lynis-audit spooftooph wifihoney twofi truecrack uberharvest acccheck statsprocessor iphoneanalyzer jad javasnoop mitmproxy ewizard multimac netsniff-ng smbexec websploit dnmap johnny unix-privesc-check sslcaudit dhcpig intercepter-ng u3-pwn binwalk laudanum wifite tnscmd10g bluepot dotdotpwn subterfuge jigsaw urlcrazy creddump android-sdk apktool ded dex2jar droidbox smali termineter bbqsql htexploit smartphone-pentest-framework fern-wifi-cracker powersploit webhandler

64-Bit Tools:

apt-get install libcrafter blueranger dbd inundator intersect mercury cutycapt trixd00r rifiuti2 netgear-telnetenable jboss-autopwn deblaze sakis3g voiphoney apache-users phrasendrescher kautilya manglefizz rainbowcrack rainbowcrack-mt lynis-audit spooftooph wifihoney twofi truecrack acccheck statsprocessor iphoneanalyzer jad javasnoop mitmproxy ewizard multimac netsniff-ng smbexec websploit dnmap johnny unix-privesc-check sslcaudit dhcpig intercepter-ng u3-pwn binwalk laudanum wifite tnscmd10g bluepot dotdotpwn subterfuge jigsaw urlcrazy creddump android-sdk apktool ded dex2jar droidbox smali termineter multiforcer bbqsql htexploit smartphone-pentest-framework fern-wifi-cracker powersploit webhandler

Backtrack 5 r3 Tutorials | How to install Backtrack 5 R3

Now i'm going to teach about "How to install backtrack 5 R3 in windows , Linux , and Mac.

 Watch this Video and try now..



How to Recover Data from a Crashed Hard Drive



Today, we will help you how to Recover Data from a Crashed Hard Drive. When your PC switch off suddenly due to any hardware failures or software error problems. If you are regular computer user; you may know that a hard drive failure is an unpredictable situation. It happens very often that your hard drive gets crashed and you ultimately lose you precious saved data and files leading to great discontentment and grief. It's really a worst condition when you are working on an important file or data or picture etc and suddenly everything gets blank and Oh God, your hard disk breaks down. And it becomes even more critical when you don't have any backup installed in your computer at all.
Though crashing hard drive means total data loss from your computer system but now with the advancements in IT technology, it has become possible to recover your data or file or work when the hard drive stops booting. There are various methods with which you can recover your important data and fix the problem at the ease of your own comfort without waiting for the technician to come. Here I am discussing how to recover your data from a crashed hard drive. Some times your pc may crash due to virus attacks. So in order to avoid such situtatuions you need to secure your pc with good antivirus softwares.



The first step to be taken for solving the problem is to take out the crashed hard drive from the system. Then install this hard drive in another computer as a secondary drive having Windows installed on it. After it, boot into Windows and install PC Inspector File Recovery. The software is available at free of cost and we provided the download link of the application at the end of the article. But always install it on the primary drive to avoid the over-writing of files you are going to restore. After downloading the PC Inspector File Recovery, open it and select the language. The software is compatible for all windows versions xp/vista/7 and windows 8. A welcome screen will appear with having three options in it:
Recover deleted files

This option enables you to restore only those files which have been deleted permanently from your drive and have not been over-written yet.

Find lost data

By choosing this option, you will be able to recover the data which has been lost as a result of hard drive crash. With this option, you will further get two more options of "start cluster" and "end cluster". It's better to leave the scanning process of entire drive as it takes a long time depending on the size of your drive.

Find lost drive

It is the third option which should be used when you don't see your drive letter in my computer or windows explorer. This option will help you connect the drive and to find your lost data.

But in the case, if there is no secondary computer to work with, go for the Ultimate Boot CD for Windows. With the help of UBCD, you will be able to boot into Windows which will then run utilities on the damaged drive that will help you solve the issue. With UBCD, you gain an access to various utilities and PC Inspector File Recovery is also one of them which can be run on the system from a CD. For creating UBCD for Windows, you require a PC with Windows XP and XP Installation CD. To keep your crashed hard drive into the freezer is also a successful method to recover the data or files. Download Here

If all of the above mentioned methods not work, It's time to send your hard drive in the hands of a computer technicians who will use any data recovery tool or apps to help you recover your lost data successfully. However, you may also search for a data recovery software online and get it installed on your computer system.

Hard drive crash is a common problem that can happen with anybody at any time. So search for the right option and save your precious data and files from getting corrupted.

Ilya Elbert writes for several ITSupportDenver and Computer Repair Denver companies.

Download Link for PC Inspector File Recovery

Wednesday, May 9, 2012

how to uninstall backtrack from hard disk

 In this article i am gonna show you how to easily you can uninstall your backtrack series (3,4,5) from your hard-disk when you are using it with another
operating system like a windows 7 or windows xp.
so let we start, we need one bootable windows 7 cd ( if you have dual booted with xp then use xp bootable )

now put bootable dvd or pendrive in to your system and restart it.

well select repair windows option or press R button keys when installation menu comes up
now choose command prompt
now type
Bootrec.exe /fixmbr
this will load standard windows boot menu and remove Ubuntu grub,
ok now go to your windows 7 or xp

AFTER REPAIR : 
 
1.  Right click on my computer

2.  select manage option ( manage option needs administration rights)

3.  Now click on Device manager,you can see your backtrack partition ( it won't con tain name like C drive or D drive but you can verify with 76 gb of partition     and 3 gb of partition )

4. delete volume,Reboot your system,voila you have done  

5. backtrack is now uninstall from your computer

Wednesday, April 18, 2012

Hide Your Personal Files and Folders in Linux

Steps to Hide a File or Folder :

1. Open the drive containing the folder.

2. Select the folder to rename it. or by simply pressing F2 after selecting the folder.



3. Rename the folder by putting a “.” (dot) in front of current name. Press ENTER.



4. The folder is now ready to be hidden.



Viewing the Hidden File or Folder :

Proceed in the following steps to view the folder you have hidden :
1. Navigate to the location of the hidden folder.
2. In the menu bar, click the “View” tab and select to check the box next to “Show Hidden Files”. This can also be done by simply pressing “Ctrl + H”.

Your hidden folder appears to you, enabling you to access it right away. This of-course doesn’t change the hidden property of the folder. Re-hiding the folder involves just clicking on the “View” tab once more and un-checking the box next to “Show Hidden Files” or pressing “Ctrl + H” once again.

Un-hiding the File or Folder :

Un-hiding a hidden file or folder in Linux is a much simpler task. The process is described below :
1. Follow the steps to view the hidden folder as mentioned above.
2. After the folder can be viewed, select to rename it once again.
3. Just remove the “.” (dot) you had placed at the beginning of the name of the folder and press ENTER.

The folder has been un-hidden.
Hiding a file or a folder is a basic example of the highest level of security that Linux provides its users with. This, and a lot more makes Linux the “numero uno” operating system for a secure workstation.

Tuesday, April 3, 2012

Increase Bandwidth Speed by 20%



Windows uses 20% of your bandwidth Here's how to Get it back

A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)



Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:



Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth



Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

I have tested on XP Pro, and 2000 other o/s not tested.

Please give me feedback about your results

Pic-run

Sunday, April 1, 2012

How to use pendrive as ram memory in windows 7



Hi friends, Windows 7 and Windows vista comes with a ready boost option. Q-What is ready boost
Ans- "ReadyBoost is a disk cache component of Microsoft Windows, first introduced with Microsoft'sWindows Vista in 2006 and bundled with Windows 7 in 2009. It works by using flash memory, a USB flash drive,SD cardCompactFlashexternal hard drive


 or any kind of portable flash mass storage system as a cache. ReadyBoost is also used to facilitate SuperFetch, which allows it to perform analysis of boot-time disk usage patterns and creates a cache which is used in subsequent system boots." Source
If you are using a high configuration PC, It doesn't show any effect on speed because if you are a normal user I think only a few times you use your full ram memory but if you are using an old pc with low ram memory(Like 512 MB or IGB) and harddisk & using vista or 7. It speed up your PC and you will see the result, reduced application data loading time, reduced shutdown and restart time and many more you can't imagine without High ram memory. How to use this feature
Plug in your pendrive-> Format with NTFS or FAT32
Now go to properties->Select ReadyBoost
Check Use this device->Choose maximum space to reserve system speed
Click on Apply and OK. Your readyboost PenDrive is ready Now to Use.
Here is an personal suggestion HP and Sandisk is the Best for this work so what are you waiting for.

Read Deleted SMS Messages On Any Nokia S60 Phone




This would help all people who accidentally deleted an important sms and lost valuable information.
Required utility:
1) Any system explorer or file explorer program eg. Fexplorer
Step 1) Open Fexplorer
Step 2) Select drive C: or D: depending on the memory in which the Sms messages have been saved.
Step 3) For example u selected c: , Then open “system” folder.
step 4) Then in “system” folder open “mail” folder.
step 5) Then in this folder u will see different folders (eg 0010001_s) and certain files (eg 00100000). These files are the actual messages. Browse through every folder and open all files till u get the sms u are looking for.
Step 6) For opening the files don’t choose options>file>open as it will show format not supported rather choose options>file>hex/text viewer. By selecting the “Hex/ text viewer” u ll be able to open and read the deleted SMS messagei it will be useful information for you Friends

Wednesday, March 28, 2012

5 Useful Things in Backtrack Linux

I'm trying to write 5 most useful things you should know in Backtrack Linux. Please check it below.

1. About user name and password

Backtrack use root for the username and toor for the password. You should provide it at the first time login in your first time installation.

2. startx command.

Don't shocked if you see the black screen with command only when you use backtrack. Backtrack designed to use command line, but if you want to enable the window, you can type startx command after you log in.

3. Metasploit Framework

The most famous tools in Backtrack is Metasploit framework, this tools is used for penetration testing into vulnerable system. You can go to metasploit framework by typing /pentest/exploits/framework3/msfconsole, and there's also /pentest/exploits/framework2/msfconsole.

4. Log Out

In Backtrack, you cannot restart or shutdown your computer from X-Window. One thing you can do when you finish use backtrack from X-Window is Log Out. To do this, click the Dragon icon at the bottom left of your Backtrack and then Click Log Out.

5. Shutdown, Restart

When you finish use the X-Windows, you will be inside the terminal again.
To shutdown your Backtrack : poweroff
To restart your Backtrack : reboot

Tuesday, March 27, 2012

Convert 1GB memory card to 2GB memory card

Memory cards are used in many electronic items, like computers, digital camera, mobile phones, and mp3 players. Everyone uses memory cards to store data, but what if you bought a card some days ago and now you feel that this is not enough to fulfill your needs. We have a solution for you; you can convert your 1GB memory card into 2GB with the help of free software.


You just have to follow the given instructions to upgrade your card. After completing the procedure, you will be amazed to see that your 1GB card is storing data according to 2GB memory. Before following the instructions, make sure that you have a 1GB memory card because the application works only on 1GB cards.

1. Insert the memory card to your PC.

2. Keep a back up of all the data from the memory card, because first you have to format the card.

3. Download and install Skymedi software CLICK HERE TO DOWNLOAD

4. After installation, the application will launch automatically showing a windows with options “Fix
and “Cancel”. From the drop down menu, you have to browse the memory card.


5. Once you select the location of the card, click on “Fix”, it will ask you for the confirmation, you have to click on “Yes”. After selecting the memory card, the application will show you a size of around 955MB; this is because you have inserted a 1GB memory card.

6. After finishing the process, the application will ask you to unplug the memory card. Remove it and insert it again. Now the storage capacity of the memory card is increased to 2GB.


7. If you want to check the storage of the memory card you can click on My computer --> Memory card --> Select Properties. You will see that the size of the memory card is 2GB. If you are using Windows Vista7, you will see “Computer” instead of “My computer”. Open that right clicks on the memory card, select properties and you will be able to check the size of the memory card.

8. There is one more way to confirm the storage capacity. Reopen the Skymedi and select the location of the memory card. This time it will show 1912KB, which is 2GB.

Friday, March 23, 2012

How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well if you are one among those few who would really bother to understand how an antivirus works, then this article is for you.
 

How Antivirus Works

 
An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two most widely employed identification methods:
 

1. Signature-based dectection (Dictionary approach)

 
This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk. 
As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants, so that the virus can be analyzed and the signature can be added to the dictionary.
Signature based detection can be very effective, but requires frequent updates of the virus signature dictionary. Hence the users must update their antivirus software on a regular basis so as to defend against new threats that are released daily.
 

2. Heuristic-based detection (Suspicious behaviour approach)

 
Heuristic-based detection involves identifying suspicious behaviour from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus softwares to identify new malware and variants of known malware. Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.
For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.
File emulation: This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.
Most commercial antivirus softwares use a combination of both signature-based and heuristic-based approaches to combat malware.
 

Issues of concern

 
Zero-day threats: A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet unidentified by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However most of the threats are identified after a day or two of it’s release, but damage caused by them before identification is quite inevitable.
Daily Updates: Since new viruses and threats are released everyday, it is most essential to update the antivirus software so as to keep the virus definitions up-to-date. Most softwares will have an auto-update feature so that the virus definitions are updated whenever the computer is connected to the Internet.
Effectiveness: Even though an antivirus software can catch almost every malware, it is still not 100% foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead by writing “oligomorphic“, “polymorphic” and, more recently, “metamorphic” virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Thus user education is as important as antivirus software; users must be trained to practice safe surfing habits such as downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source. I hope this article will help you understand the working of an antivirus software.