Tuesday, 31 March 2015

How to Create a Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by other users of your PC? Well, here is a way to do that.
In this post, I will show you how to make an invisible password protected folder in Windows without using any additional software.

How to Create a Password Protected Folder?

Here is is step-by-step procedure to do this:
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now, in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now go to the File menu and select the option Add a password (File -> Add a password)
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus ,you have now created the password protected folder.

How to Make the Folder Invisible?

Step-1: Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder, go to My Computer -> Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options:
  • Do not show hidden files and folders.
  • Show hidden files and folders.
Select the second option and press OK. Now the invisible folder becomes visible in its location. To access it you need the password. To make it invisible again, repeat step -1 through step-3 and select the first option and click OK. Now, the folder becomes invisible once again.
I hope that you’ve now understood how to create an invisible password protected folder in Windows. If you like this post, pass your comments! Cheers :)

How to Create a CON Folder in Windows?

Have you ever tried to create a CON folder or any folder with names such as “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. but failed? Is it impossible to create folders with such names in windows?
Well, the answer is NO and YES!
NO because, when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try to renaming it any number of times. Where as in case of Windows Vista and Windows 7, when you try to rename the file you get an error message saying “The specified device name is invalid”.
What is the reason behind this? Simple, these names represent the internal devices of the operating system and hence we cannot create folders with the above names.
YES because it is still possible to create these folders using some simple methods as explained below:

1. Using the Command Prompt:

Here is a step-by-step procedure to create the “con” folder using the command prompt:
  1. Go to the command prompt:
  2. Type in the command prompt (For ex. To create a folder in the E: drive by name: “CON”)
    C:\>md \\.\e:\con
    NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.
  3. In case if you wish to delete the folder, use the following command:
    C:\>rd \\.\e:\con
NOTE: This folder can only be deleted from the command prompt. You cannot remove it by right-click delete.

2. Using ALT Key and Numeric Keypad:

You can also use the Alt key and the Numeric keypad to accomplish the same job in a much easier way. Here is how you can do it:
  1. Create a New folder (Right-click -> New -> Folder)
  2. Once the new folder is created, right-click on it and select the option “Rename”.
  3. Hold down the ALT key and type 0160 from the numeric keypad (ALT+0160) and release the ALT key.
  4. Now, the folder name should go blank so that you can type any name of your choice such as “con”, “prn” “nul” etc. and press Enter. That’s it, you’re done!

How to Test the Working of Your Antivirus: EICAR Test

Have you ever wondered how to test your antivirus software so as to ensure that it is working properly? Well, here is a quick and easy way to safely test your antivirus without having to deal with the real virus. The process is called EICAR test. This test is designed to work on any antivirus software and was developed by European Institute of Computer Antivirus Research.
This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer.

How to Test Your Antivirus?

Here is a step-by-step procedure to test your antivirus functionality:
  1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
    EICAR Test code
    X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  2. Rename the file from “New Text Document.TXT” to “virus-sample.com”.
  3. Now run the antivirus scan on this “virus-sample.com” file.
If the antivirus is working properly on your computer, then it should generate a warning message and immediately delete the file upon scanning. Otherwise, you may have to re-install your antivirus.
NOTE: Most antivirus (with auto-detect feature) will pop-out a warning message in the Step-1 itself.
You can also place the “virus-sample.com” file in a ZIP or RAR file and run a scan on it so as to ensure that your antivirus can detect the test string even in the compressed archive. Any antivirus while scanning this file should respond exactly as it will do for a genuine virus/malicious code.
This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence, it is the safest method to test the proper functioning of any antivirus software.

How EICAR Antivirus Test Works?

During the development of the antivirus software, the AV programmers flag the EICAR test code/string as a verified virus. This is a standard adopted by every antivirus company so as to make the testing process simple and risk-free. Therefore, every antivirus will respond to EICAR string in the same way it does for a genuine malicious code.

How to Change the Logon Screen Background in Windows 7

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to change the Windows 7 logon screen and set your own picture/wallpaper as the background.
Customizing the logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well, here is a step-by-step instruction to change the logon screen background:
  1. The image you need to set as the logon screen background should be a .jpg file and its size should not exceed 245KB.
  2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.
  3. You will need to copy this image to the following location:
    C:\Windows\system32\oobe\info\backgrounds
    You will need to create that path if it does not already exist on your computer.
  4. Now, open the Registry Editor (Start -> Run -> Type regedit) and navigate to the following key:
    HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
    LogonUI\Background
    If the key Background does not exist, then right-click on LogonUI, select New -> Key, and then name it as Background.
    Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New -> DWORD and name it OEMBackground.
  5. Double-click on OEMBackground and set the Value Data to 1.
  6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.

Using a Tool to Change the Logon Screen Background:

The above steps will give you a detailed instruction on how to change the logon screen background manually. However, there is a nice tool to completely automate the above steps so that you can do everything with just a few mouse clicks!
The tool is called Windows 7 Logon Background Changer from Julien-Manici.com. This small tool is very easy to use and contains a set of preloaded images to choose from or you can set your own desired image as the logon screen background.
I hope you love this post! Pass your comments. Cheers :)

How to Know if Someone Accessed My Computer When I am Away

Do you have a feeling that someone tried to access your computer when you stepped out for a lunch or quick coffee break? Perhaps your colleague or the person sitting in the next desk tried to log in or play something wicked on your computer while you were away for a quick session.
So, how do you know if someone tried to access your computer in your absence? Well, here is a way by which you get notified every time when such an attempt is made.
MouseLock
The website called MouseLock.co gives a solution here. All you have to do is visit the site’s homepage, sign in to your Gmail account and select your secret point (unlock code) from the screen. Once you do this, you will have to place your mouse cursor into the slot shown and click on it. This will activate the mouse lock feature on your computer screen.
MouseLockED
So, when an unauthorized person tries to move the mouse in your absence, he will be given just a few seconds to select the unlock code. Upon failure to do so, you will get an instant notification about the intrusion in your mailbox.
If you have a webcam attached to your computer, you can even get the photo of the person trying to intrude. This will make it easy for you to figure out who actually was the person.
As this is an easy to use web application, you can use it any time just by loading the MouseLock website without the need to install anything on your computer. Even though MouseLock does not manage to prevent the intrusion, it will give you an instant notification about it, so that you aware of what is happening at your desk when you are away.

How it Works?

MouseLock operates by using the “mouseLeaveEvent” from JQuery to track the mouse movements. On the other hand, it uses the “getUserMedia()” API that is supported by Chrome and Firefox to capture the webcam photographs.

Saturday, 28 March 2015

How to Track Lost Android Phone and Tablet

Your Android gadgets are the most important things in your life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Use the IMEI Number

Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B

Another way of tracking your lost Android gadget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.

Lookout Security and Antivirus

Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.

Android Device Manager

Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the site https://www.google.com/android/devicemanager and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet.

10 Internet Security Tips for Complete Protection

With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today, most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, the security has become a questionable factor for the most Internet users.
However, it is still possible to effectively combat insecurity on the Internet provided that, the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91 percent of the Internet users are unaware of the online scams and are therefore worried about their security. If you are one among those 91 percent, then this post is just for you!

10 Tips for Internet Security:

Here is a list of 10 simple Internet security tips to maximize your online protection:
  1. Always install a good antivirus software and keep it up-to-date. Also install a good anti-spyware to keep spyware away from your computer. You can find review and comparison of best antivirus products at iWebGUARD.
  2. Always visit known and trusted websites. If you are about to visit an unknown website, ensure that you do not click on those untrusted links and banners.
  3. Perform a virus scan on the files/email attachments that you download before executing them.
  4. Regularly update your operating system and browser software. For a better security, it is recommended that you surf the Internet through the latest version of your browser program.
  5. Never share your password (email, bank logins etc.) with any one for any reason. Choose a strong password (A blend of alphanumeric+special symbols) and change it regularly, eg. every 3 months. Avoid using easy-to-guess passwords. (ex. pet’s name or kid’s name)
  6. Always type the URL of the website in your browser’s address bar to enter the login pages.
  7. Before you enter your password on any login page, ensure that you see https instead of http in your browser’s address bar. Example. https://mail.google.com instead of http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets Layer) and provide better security than a normal HTTP.
  8. Beware of phishing emails! Do not respond to any email that request you to update your login details by clicking on a link in the body of the email. Such links can lead to Fake Login Pages (Spoofed Pages). 
  9. Always hit the logout button to close your login session rather than abruptly terminating the browser window. Also, clear your web browser caches after every session to remove the temporary files stored in the memory and hard disk of your PC.
  10. Avoid (Stop) using any public computers or computers in the Internet cafes to access any sensitive/confidential information. Also, avoid such computers to log in to your email/bank accounts. On a public computer, there is every chance of spyware and malware infections to be present.
By following the above 10 tips, your Internet security can be guaranteed up to 90 percent. I hope this information will help my readers for keeping themselves safe from any of the online insecurities. Cheers! Pass your comments.