Recover files from a Virus Infected USB Drive

Hi Folks,

                                                Today i'm going to teach you about "how to recover the virus infected files from USB drive, for this method of removing viruses you don't need any third party software's need to be installed. 😎

This trick will helpful, when your antivirus pack is getting expired (or) your system doesn't have antivirus application.

Note:
             Before perform this, make sure that you have logged in as Administrator in your windows machine.

1.     Open Command Prompt (CMD). ( Go to Run >> Type CMD >> Hit Enter )



2.     Type the drive letter of your removable device with a colon in command prompt and hit Enter (Ex : d:) 

3.     Now Type: attrib d:*.*/d/s -h -r -s (Replace d: with the drive name of your drive)



4.     Hit Enter and that's it you done. The query which was entered in Command prompt, will remove the viruses and shortcuts automatically. 

Guys, hope this will helps. Keep me post your valuable feedback's in the comment section below and subscribe our FB page to get more tech alerts.

Thanks for Reading !! Have a Happy Weekend..!! 😊






How to Know whether your pen drive is Fake or Not ?

Hello Everyone,

As very long back, this is my first post in these current year.

i) You need to visit this link and need to download H2testw 1.4 installer.

ii) Once you have installed in your machine, you can able to find below window.

iii) Please ensure before checking this, your Pendrive / Memory Card must be empty.

Introduction-Parallel computing

Parallel computing is a form of computation in which many calculations are carried out simultaneously,[1] operating on the principle that large problems can often be divided into smaller ones, which are then solved concurrently ("in parallel"). There are several different forms of parallel computing: bit-level, instruction level, data, and task parallelism. Parallelism has been employed for many years, mainly in high-performance computing, but interest in it has grown lately due to the physical constraints preventing frequency scaling.[2] As power consumption (and consequently heat generation) by computers has become a concern in recent years,[3] parallel computing has become the dominant paradigm in computer architecture, mainly in the form of multicore processors.[4]


Parallel computers can be roughly classified according to the level at which the hardware supports

IP address spoofing

Background

The basic protocol for sending data over the Internet network and many other computer networks is the Internet Protocol ("IP"). The header of each IP packet contains, among other things, the numerical source and destination address of the packet. The source address is normally the address that the packet was sent from. By forging the header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine. The machine that receives spoofed packets will send a response back to the forged source address, which means that this technique is mainly used when the attacker does not care about the response or the attacker has some way of guessing the response.
In certain cases, it might be possible for the attacker to see or redirect the response to his own machine. The most usual case is when the attacker is spoofing an address on the same LAN or WAN.

Send Mails anonmously

Well sometimes when you want to send someone a mail and do not want to disclose your identity , you use a tool called GOOGLE and search for the following terms-~~ “How to send anonymous mails to someone” “how to spoof emails” and “how to send mails with some other sender address”.
There are a few ANON mailer sites and other softwares. i have tested them all and these are the results
1.Anonmail2emkei.cz/ On number one position was the emkei.cz. It provides many options including the attachment,X-Mailer, Header,
SMTP Server selection,Date and time selection ETC. they do not record the mails or log them which ensures our privacy. this is the best fake mailing service out there. The message is delievered within a minute or 30 secs and will look like this ~~

2. On the second position hails the http://send-email.org/. This service is free and delievered the messages in seconds. but this has one weak point!! It dosent allow you to enter your own fake email address which is bad for fake emailing.
Anonmail3
3.Anonmail4next comes https://www.silentsender.com/. Silent sender is a secure site ie: HTTPS. silent sender is a service that works in a different way. You type in the message and send the mail to the respected person anonymously. Teh person gets a code and then he/she has to go to there site and enter the code to see the message. In this process the identity of the sender is secured and there is no way in which people can tell that you have send the message untill and unless you have written your name in it.
Anonmail5
The code in the pic has to be entered here for the person to see the message
Anonmail6