Wednesday, 28 January 2015

How to recover deleted data


How to recover deleted data


Best 5 Software’s To Restore Deleted files


Generally if we delete a file, that file will be sent to Recycle Bin. To restore it we just need to Right click on the file in Recycle Bin and by clicking on RESTORE we can get the file back to the same location where it is stored previously, but what if we deleted the file permanently from by even removing it from Recycle bin  Or  What if we deleted the file by Pressing SHIFT + DELETE to remove the file permanently??? We can get back or restore such file generally. But by using Data recovery software’s we can get the file back easily.

 

How can Data recovery software’s restore the permanently deleted files?

Generally if you delete a file from the Hard Disk it won’t get deleted!!
Just the link between the file and operating system gets deleted so that we can’t access the deleted file, So the file will still exists in the hard drive and it will exists until it is over written by some other file. What these data recovery software’s does is, they will search for all such file existing in the hard disk and will again let us to access such files.

All the below mentioned software’s are very less in memory but are very efficient in resorting the files back.

1.  Recuva

Recuva is most widely used utility to restore permanently deleted files. You can either normally scan for the files or can do deep scan. Recuva is capable of restoring all the data from your hard disk or any external storage devices to. It’s very simple to use, we can search particularly for images, videos, zipped files, documents or simple you can search all files by selecting ALL FILES. You can even define the search exactly for a Drive or any particular location.

Download Recuva to restore Deleted Files



                                                                                      DOWNLOAD


2. Pandora Recovery



Pandora is also a good working utility to get back permanently deleted files. By simply navigating through the particular location we can set the scan and can get back the files easily. It recognizes, hard disks, Network disks, Flash drives etc.

Download PANDORA RECOVERY to restore Deleted Files

                                                                                       DOWNLOAD


3. Un Delete 360




This is compatible with all the latest version for windows operating system. As this is built on very fast algorithm you can restore your files in very less time. Regardless of storage device you can get back the files from anywhere. UNDELETE 360 supports both file recovery and folder recovery.

Download UNDELETE 360 to restore Deleted Files

                                         DOWNLAOD



4. Gallery Undelete



This is yet another simple and effective software available for free to recover the deleted files in a easy manner. You can even restore the data that is deleted by the viruses.

Download GALLERY UNDELETE to restore Deleted Files

                                        DOWNLOAD


5. Free Undelete




As the name itself says this is also a free utility available on internet. You can filter the deleted files by name, size of the file and date. This works faster and can even restore the files that are deleted due to viruses, bugs and errors.

Download FREE UNDELETE to restore Deleted Files

                                    DOWNLAOD

How to remove write protection from Pen Drive




How to remove write protection from Pen Drive 

Actually there are many working ways and methods in which you can do this, here in this post I am listing out all the working methods to remove write protection from the pen drive, check them one after another and you can easily do it.

Normally when a Pen drive is write protected it will show an error something like this when you try to write your pen drive.




1. Editing the Registries to Remove write protection from USB drive 


Follow the steps one after another to more write protection from the Pen drive.1. Press CTRL + R to open the RUN box,2. Type REGEDIT and hit enter3. Navigate toHKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Control > StorageDevicePoliciesand hit enter.4. Give a double click on the WRITE PROTECT and a box will open in that enter the Value as 0 and press OK button5. Now restart your PC and again connect your USB pen drive to your computer and verify.That’s it hopefully it will work.Note: - In case you can’t find the “StorageDevicesPolicies” in the Registry settings follow the steps below1. Open your Notepad and copy the below code to itcd\reg add "HKLM\System\CurrentControlSet\Control\StorageDevicePolicies" /t Reg_dword /v WriteProtect /f /d 12. Now save this as add.bat (it should be with .bat extension or else it won’t work) and run it.3. Now continue the above process and it will work fine.



2. Formatting the Pen drive before OS boots to Remove Write protection

Follow the below steps carefully to remove write protection from the USB storage drives
1. Shut down your PC/LAPTOP
2. Connect your USB drive to your PC/LAPTOP and turn it ON. While the system is booting pres F8 continuously and advanced booting option screen will open.
3. In that select Safe mode with command prompt.
4.  After the files loads, in the command prompt navigate to the drive of your pen drive.
At first it will look something like this C:\windows\system32>
now let your drive letter is “H”. Then you have to type C:\windows\system32>H:
and hit enter
5. Now type
H:\>format H:
it will again ask you for confirmation of Yes or No (Y/N). Type Y and hit Enter.
By doing this your pen drive will get completely formatted, which will remove the write protection from it.





3. Using Command prompt to remove Write protection from Sandisk pen-drive

Follow the below mentioned steps to remove write protection from the PEN DRIVES


1. Press CTRL + R and open the RUN box.


2. Type CMD to open the command prompt window
3. In the command prompt type DISKPART and hit enter
4.  A new command window will open, in that again type LIST DISK and hit Enter
5. Now again type “Attributes disk clear read-only” and hit enter



You can even try this method to format your Pen drive completely and remove write protection from it.





4. Formatting the Pen Drive to Remove write protection from the pen drive


Here is the step by step procedure to remove the write protection from the pen drive
1. Open your desktop and give a Right click on the MY COMPUTER icon and select MANAGE from the list.2. From the left panel select the DISK MANAGEMENT under STORAGE3. Now give a Right click on our Pen drive and select format from it.4. Conform it by clicking again on the YES and finally click OK to format





Tuesday, 13 January 2015

How to increase battery backup of a Laptop

How to increase battery backup of a Laptop




Reducing battery charge of a laptop is quite obvious problem every laptop user has to face. Increasing your laptop battery backup really gives you work freedom irrespective of the place you are using the laptop. The battery backup can be increased by avoiding some nonstandard habits.
In fact,  you can configure your laptop for use at library, on a plane, at work and so on. Various profiles will provide a unique set of energy saving settings for each scenario.
You can extend your overall battery life if you apply some of the following :
·         
            Avoid the usage of CD-ROM / DVD drive.
It seems quite obvious. But the truth is that, CD-ROM/ DVD drives require more charge compared to USB devices. So it will eat up your battery charge . One way to decrease battery discharge is to go for CD/ DVD only when it is necessary. Make an habit of storing it in your hard disk and not in an external device. As an alternative, you can make use of a virtual optical drives by using software such as Alcohol 120%.
·        
    Disable wireless card/ Bluetooth adapter.
Even if you don’t use external device but prefer to use your bluetooth adapter, but has an habit of enabling bluetooth adapter and wireless cards, know that it is another charge eating habit. Don’t forget to disable wireless card and bluetooth button. Most notebooks will include a shortcut on the chassis to apply this function. This can tremendously reduce battery consumption.
·        
    Stop cooling functionality
Cooling functionality of your laptop
is another problem if you are overworking by making use of a laptop cooling pad. Apparently, it would be better to avoid dusty surfaces or propping your notebook up against a soft surface such as a blanket or pillow. This will largely affect your cooling functionality to work harder. Use a nice pad while using your laptop and make an habit of keep using it whenever it is necessary.
·         
    Disable unused ports.
Another nice habit one should have, to increasing battery life is to disable unused ports. The unused ports includes but not limited to USB, VGA, SmartCard and PCMCIA ports. If you are a windows user you can make use of Windows Device Manager, found in the Control Panel.

·    Run a defragmentation on your hard disk drive.
Running a defrag on your hard disk drive will greately help you to reduce the work load of your hard drive and quite obviously you would not have to work harder the more fragmented it becomes. This measure can save your battery life by running out easily.
·   
      Hardware profiles
In addition, you can configure hardware profiles by using your notebook software that comes in bundle with Windows. Since the advent of Windows XP, Microsoft has removed the Hardware Profiles feature from their operating system. If your notebook software doesn’t provide this feature, simply set your screen saver to display a blank screen as an alternative.

·   Decrease Display Brightness
Display brightness is one of the important thing you must concentrate on, if you really give importance for your laptop battery backup, Decreasing your laptop display brightness will enhance your battery backup by 30-60% sometimes.


Friday, 2 January 2015

Simple Steps To Become a good Hacker

Simple Steps To Become a good Hacker

Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of some most important steps necessary to become a good hacker, have a deeper look

1. Learn UNIX/LINUX

UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

 

2. Code in C language

C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

 

3. Learn to code in more than one Programming Language

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

 

4. Learn Networking Concepts

Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

 

5. Learn More Than One Operating Systems 

It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

 To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

 

8. Experiment A Lot

After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects

An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.


100 Websites You used and improve your skills

100 Websites You used and improve your skills

   BUSINESS + E-COMMERCE

·         blogs.hbr.org
·         fastcompany.com
·         entrepreneur.com
·         dealbook.nytimes.com
·         thebillfold.com
·         kickstarter.com
·         indiegogo.com
·         rockethub.com
·         etsy.com
·         kiva.org
·         marginalrevolution.com
·         learnvest.com
·         getrichslowly.org/blog
·         ritholtz.com/blog
·         consumerist.com
·         npr.org/blogs/money
·         blog.priceonomics.com
·         freakonomics.com/blog



AUDIO + VISUAL
·         thisiscolossal.com
·         creativetimereports.org
·         designobserver.com
·         hyperallergic.com
·         transom.org
·         atavist.com
·         thirdcoastfestival.org
·         nfb.ca/interactive
·         woostercollective.com
·         c-monster.net
·         artfagcity.com
·         pitchfork.com
·         blog.largeheartedboy.com


 LITERATURE, MEDIA + CULTURE
·         theparisreview.org/blog
·         lareviewofbooks.org
·         themillions.com
·         therumpus.net
·         theawl.com
·         grantland.com
·         slate.com
·         vulture.com
·         themorningnews.org
·         pw.org
·         longreads.com
·         goodreads.com
·         thefrisky.com
·         rookiemag.com
·         mediamatters.org
·         jimromenesko.com
·         poynter.org
·         niemanlab.org
·         google.com/trends
·         youtube-trends.blogspot.com
·         onthemedia.org/blogs
·         journalism.org
·         bookslut.com/blog/
·         brainpickings.org
·         buzzfeed.com

POLITICS, NEWS + GLOBAL ISSUES
·         change.org
·         pewresearch.org
·         politico.com
·         thinkprogress.org
·         brookings.edu
·         aljazeera.com
·         qz.com
·         www.propublica.org
·         alternet.org
·         dish.andrewsullivan.com
·         good.is
·         dissentmagazine.org

EDUCATION
·         edsurge.com
·         khanacademy.org
·         edx.org
·         coursera.org
·         udacity.com
·         generalassemb.ly
·         baeo.org
·         edweek.org
·         nces.ed.gov
·         greatschools.org
·         stand.org
·         crpe.org