Bootable pendrive using Command Prompt

Follow below steps to create a bootable pendrive using command prompt to install Windows Vista/ Windows 7/  Windows 8.

Steps:

  1. Insert your USB (4GB+ preferable) stick to the system and backup all the data from the USB as we are going to format the USB to make it bootable.
  2. Open elevated Command Prompt. To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.

  3. When the Command Prompt opens, enter the following commands:
       DISKPART and hit enter.
       LIST DISK and hit enter.
Once you enter the LIST DISK command, it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.

SELECT DISK 1 (Replace DISK 1 with your disk number)
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
(Format process may take few seconds)
ASSIGN
EXIT
Once it is done, copy the windows os contents to the pendrive.
You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature).
watch below video for more info 

why facebook is blue in color

When you open Facebook, the first thing that you notice is the blue color it uses. Ever wondered why is Facebook so blue in color and not changing its color scheme?

Ever since they started as 'thefacebook', Facebook has stayed with the blue color. Although major changes have been made in the Facebook theme since then, the major unchanged thing has been the blue color.

               


Everywhere from its login page to Facebook groups, you find only blue.





The reason for this is that  Mark Zuckerberg, The founder of Facebook is red-green color-blind and blue is the richest color for him which he confirmed in an online interview.

Another important factor for using blue color is the fact that most colors tend to distract the viewers. Blue on the other hand acts as a transparent background to the main content as visible to the human brain due to which most popular websites tend to use the blue color. It can easily be called a webmaster's favorite color.

All these factors make Facebook to have blue as its prominent color.


 Fact:  In its earlier days, thefacebook.com required you to have an  .edu email id to join.

Source: Google, Tweaks&Tricks.

Use Browser as text editor

Using this simple trick you can change your browser(Opera, Firefox, Internet explorer, Google Chrome) as text editor.

Follow the Instruction below:

1 Copy below code in browser Url Section

   data:text/html, <html contenteditable>



2. Now Press Enter.

3. Now you can type anything as would do on any other text editor like Notepad.



4. To save your text file Press Ctrl + S and save it as anything.txt (.txt Is Must)




Simple vbscript to make your Computer Welcome You

Using this trick you can make your computer to welcome you in its computerized voice

Follow the instruction below:

1. Open notepad.

2. Copy and paste the code below.

          Dim speaks, speech
          speaks="Hey buddy"
          Set speech=CreateObject("sapi.spvoice")
          speech.Speak speaks


3. You can change speaks line to make your computer to welcome you in the way you like. Eg: speaks="welcome to your pc, Ron", speaks=" welcome Arthur ".

4. Click on File Menu, Save As, select All Types in Save as Type option, and save the file as Welcome.vbs or "*.vbs" .  

5. Copy the saved file.

6. Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) and to C:\Users\ {User-Name}\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista) if C: is your System drive. AppData is a hidden folder. So, you will need to select show hidden folders in Folder options to locate it "Note: Enabling hidden folder option varies depending on Operating System ".


7. Paste the file.


Next time when you start the computer, Windows will welcome you in its computerized voice 


Try it feel like Hacker.

Source:Google

Best Cloud Storage services

We like to have our digital baggage available everywhere we go – photos from the latest vacation, files of a project at work, a collection of our favourite songs, a movie clip or a blog post in the works. Cloud storage websites make it easy to access, modify and even sync these files regardless of the user’s location. Here is a list of the best cloud storage services. Some are free while some have free and premium versions. All of them offer file sharing services so that you can share and work on your data collaboratively with your co-workers or friends.

Dropbox: Offers 2GB free storage
www.dropbox.com

Google Drive: Offers 5GB free storage, needs Google account
www.googledrive.com

Box: Offers 5GB free storage
www.box.com

Ubuntu One: Offers 5Gb free storage
https://one.ubuntu.com/services/free/

Amazon Cloud Drive:Offers 5GB free storage
http://www.amazon.com/clouddrive/ref=cd_mnav_lm_ycdr?sf=1

Sky Drive: Offers 7GB of storage(Long time Sky Drive users may be eligible for 25GB free)
needs Microsoft account (msn, hotmail, outlook, live)
www.skydrive.com

Mediafire: Offers 10GB free storage
www.mediafire.com

Bitcasa: Offers 10GB free storage
https://www.bitcasa.com

4Shared: Offers 15 GB free storage
http://www.4shared.com

Mega:Offers 50GB free storage
https://mega.co.nz


Source: Google 
















Create admin profile using Command Prompt

Open cmd (Command Prompt) with administrator privilege:



Command Prompt:



In the cmd prompt type:  net user username welcome /add
This command creates new profile "username"  with password "welcome"
user profile can be created with or without password to create a profile with out password type: net user username /add


Command to add created profile to admin group:
 net localgroup administrators username /add 

New admin user profile by the name username is created successfully                                                  



 




Types of Malware (malicious programs )

Malware can be subdivided in the following types:

1. Trojan.  Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. It has the ability to hide itself from antivirus detection and steal important banking data to compromise your bank account. If the Trojan is really powerful, it can take over your entire security system as well. As a result, a Trojan can cause many types of damage starting from your own computer to your online account.

2. Virus (Vital information under siege). Looking at the technology 10 years back, Virus is something really popular. It is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. It is not so popular today because Malware today is designed to earn money over destruction. As a result, Virus is only available for people who want to use it for some sort of revenge purpose.

3. Worms (Write once read many).  One of the most harmless threats where it is program designed only to spread. It does not alter your system to cause you to have a nightmare with your computer, but it can spread from one computer to another computer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread.

4. Spyware. Is a Malware which is designed to spy on the victim’s computer. If you are infected with it, probably your daily activity or certain activity will be spied by the spyware and it will find itself a way to contact the host of this malware. Mostly, the use of this spyware is to know what your daily activity is so that the attacker can make use of your information. Such as if you browse on sex toys for a week every day, the attacker will try to come out with a sex toy scam to cheat on your money.

5. Scareware. Scareware is something that plant into your system and immediately inform you that you have hundreds of infections which you don’t have. The idea here is to trick you into purchasing a bogus anti-malware where it claims to remove those threats. It is all about cheating your money but the approach is a little different here because it scares you so that you will buy.

6. Keylogger. Something that keeps a record of every keystroke you made on your keyboard. Keylogger is a very powerful threat to steal people’s login credential such as username and password. It is also usually a sub-function of a powerful Trojan.

7. Adware. Is a form of threat where your computer will start popping out a lot of advertisement. It can be from non-adult materials to adult materials because any ads will make the host some money. It is not really harmful threat but can be pretty annoying

8. Backdoor. Backdoor is not really a Malware, but it is a form of method where once a system is vulnerable to this method, attacker will be able to bypass all the regular authentication service. It is usually installed before any virus or Trojan infection because having a backdoor installed will ease the transfer effort of those threats.

9. Dialer. This threat is no longer popular today but looking at the technology 10 years back or more where we still access the internet using a dial-up modem, it is quite a popular threat. What it does is it will make use of your internet modem to dial international numbers which are pretty costly. Today, this type of threat is more popular on Android because it can make use of the phone call to send SMS to premium numbers.

10. Dropper. Looking at the name, a Dropper is designed to drop into a computer and install something useful to the attacker such as Malware or Backdoor. There are two types of Dropper where one is to immediately drop and install to avoid Antivirus detection. Another type of Dropper is it will only drop a small file where this small file will auto trigger a download process to download the Malware.

11. Fake AV. Fake Antivirus threat is a very popular threat among Mac user about 10 months ago. Due to the reason that Mac user seldom faces a virus infection, scaring them with message which tells them that their computer is infected with virus is pretty useful where it results them into purchasing a bogus antivirus which does nothing.

12. Phishing. A fake website which is designed to look almost like the actual website is a form of phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim. Every form sent out from the phishing site will not go to the actual server, but the attacker controlled server.

13. Bluesnarfing & Bluejacking. Bluesnarfing is all about having an unauthorized access to a specific mobile phones, laptop, or PDA via Bluetooth connection. By having such unauthorized access, personal stuff such as photos, calender, contacts and SMS will all be revealed and probably even stolen. Bluejacking is also uses the Bluetooth technology but it is not as serious as Bluesnarfing. What it does is it will connect to your Bluetooth device and send some message to another Bluetooth device. It is not something damaging to your privacy or device system compared to the Bluesnarfing threat.

14. SQL Injection. SQL injection does not infect the end users directly. It is more towards infecting a website which is vulnerable to this attack. What it does is it will gain unauthorized access to the database and the attacker can retrieve all the valuable information stored in the database.

15. Pharming. Pharming works more or less like phishing but it is a little tricky here. There are two types of pharming where one of it is DNS poisoning where your DNS is being compromised and all your traffic will be redirected to the attacker’s DNS. The other type of pharming is to edit your HOST file where even if you typed www.google.com on your web browser, it will still redirect you to another site. One thing similar is that both are equally dangerous.

16. Virus Document. Virus today can be spread through document file as well especially PDF documents. Last time, people will only advice you not to simply execute an EXE file but in today’s world with today’s technology, document file should also be avoided. It is best if you use an online virus scanner to scan first before opening any single file which you feel it is suspicious.

17. Browser Hijackers. A browser hijacker uses the Trojan Malware to take control of the victim’s web browsing session. It is extremely dangerous especially when the victim is trying to send some money via online banking because that is the best time for the hijacker to alter the destination of the bank account and even amount.

18.Rootkit. Rootkit is a malicious software that is activated each time your systemboots up. Rootkits are difficult to detect because they are activated before your system's Operating System has completely booted up. A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Sometimes Rootkit may also be the cause for Blue screen error

19. Jokes: software that does not harm your computer but displays messages that this harm has already been caused, or is going to be caused on some conditions. This software often warns user about not existing danger, e.g. display messages about hard disc formatting (though no formatting is really happening), detect viruses in not infected files and etc.

20. Mousetrapping. I am not too sure whether you had encountered a Mousetrapping Malware before where what it does is it will trap your web browser to a particular website only. If you try to type another website, it will automatically redirect you back. If you try clicking forward/backward of the navigation button, it will also redirect you back. If you try to close your browser and re-open it, it will set the homepage to that website and you can never get out of this threat unless you remove it.

21. PUP (potentially unwanted program). Program that is installed without express permission from the user and carries out actions or has characteristics that can reduce user control of privacy, confidentiality, use of computer resources, Eg :Webcake, Yontoo

Source: Wiki, Google

A-Z Listing of Threats & Risks:  http://www.symantec.com/security_response/landing/azlisting.jsp














Windows commands

Windows logo key + R



Add/Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Authorization Manager= azman.msc "New"

Calculator = calc
Certificate Manager = certmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Control Panel = control "New"
Command Prompt = cmd.exe
Component Services = dcomcnfg
Computer Management = compmgmt.msc = CompMgmtLauncher "New"

Date and Time Properties = timedate.cpl
Downloads = Downloads "New"
Device Manager = devmgmt.msc
Direct X Troubleshooter = dxdiag
Disk Cleanup Utility = cleanmgr
Defragment User Interface = dfrgui "New"
Ditilizer Calibration Tool = tabcal "New"
Disk Management = diskmgmt.msc
Disk Parmelonion Manager = diskpart
Display Properties = control desktop or desk.cpl
DPI Scaling = dpiscaling "New"
Driver Package Installer = dpinst "New"
Driver Verifier Utility = verifier or /reset
DVD Player = dvdplay "New"

Encryption File System = rekeywiz "New"
Event Viewer = eventvwr.msc

Fax Cover Sheet Editor = fxscover "New"
File Signature Verification Tool = sigverif
Folders Properties = control folders
Fonts = control fonts
Free Cell Card Game = freecell

Game Controllers | joy.cpl
Group Policy Editor = gpedit.msc

Internet Explorer = iexplore
Iexpress Wizard = iexpress
Internet Properties = inetcpl.cpl
IP Configuration = ipconfig.exe
iSCSI Initiator = iscsicpl "New"

Keyboard Properties = control keyboard

Libraries = explorer or Windows key + E
Local Security Settings = secpol.msc
Local Users and Groups = lusrmgr.msc
Logs You Out Of Windows = logoff

Microsoft Support Diagnostic Tool = msdt "New"
Microsoft Paint = mspaint.exe
Mouse Properties = control mouse
Mouse Properties = main.cpl
Mobility Center (only on mobile) = mblctr
or Windows key + X
Network Connections = control netconnections
Network Connections = ncpa.cpl
Notepad = notepad

ODBC Data Source Administrator = odbcad32 "New"
Optional Features Manager = optionalfeatures "New"
On Screen Keyboard = osk or Windows key + U

Package Installer | dpinst
Pen & Touch Options | tabletpc.cpl
People Near Me Identifier | collab.cpl
Performance Monitor = perfmon.msc
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Printers and Faxes = control printers
Printer Migration = PrintBrmUi "New"
Private Character Editor = eudcedit
Problem Steps Recorder | psr.exe
Programs and Features | appwiz.cpl


Regional Settings = intl.cpl
Registry Editor = regedit.exe
Remote Assistance = msra "New"
Remote Desktop = mstsc
Resultant Set of Policy = rsop.msc

Scheduled Tasks = control schedtasks
Screen Resolution | desk.cpl
Security Center = wscui.cpl
Services = services.msc
Shared Folders/MMC = fsmgmt.msc
Shuts Down Windows = shutdown
Snipping Tool = snippingtool "New"
Sounds and Audio = mmsys.cpl
Sound Recorder = soundrecorder "New"
Sound Volume = sndvol "New"
Spider Solitare Card Game = spider
SQL Client Configuration = cliconfg
Stored User Names and Passwords = credwiz "New"
Sticky Note = StikyNot "New"
System Configuration Editor = sysedit
System Configuration Utility = msconfig
System File Checker Utility = sfc
System Information = msinfo32
System Properties = sysdm.cpl or Windows key + Pause/Break
System Restore = rstrui.exe

Task Manager = taskmgr
Trusted Platform Module = TpmInit "New"

Utility Manager = utilman
User Accounts = netplwiz or control userpasswords2

Windows Activation = slui "New"
Windows Backup Utility = sdclt "New"
Windows Fax and Scan = wfs "New"
Windows Firewall = firewall.cpl
Windows Firewall with Advanced Security = wf.msc "New"
Windows Image Acquisition = wiaacmgr "New"
Windows Media Player = wmplayer
Windows Magnifier = magnify
Windows Management Infrastructure = wmimgmt.msc
Windows Update App Manager = wuapp "New"
Windows Standalong Update Manager = wusa "New'
Windows System Security Tool = syskey
Windows Share Creation Wizard = shrpubw "New"
Wordpad = write


Command
Short description
%allusersprofile%
c:\documents and settings\all users
%appdata%
c:\documents and settings\%username%\application data
%comspec%
command line
%homedrive%
installation disk
%homepath%
user profile directory (documents and settings\%username%)
%path%
system default directories
%programfiles%
program files directory
%systemdrive%
drive containing the windows root directory
%systemroot%
windows directory
%temp% or %tmp%
temporary directory, usually c:\documents and settings\%username%\local settings\temp
%userprofile%
user profile directory
%windir%
windows folder
\
system drive
ac3filter.cpl
ac3filter
access.cpl
accessibility option control
accwiz
accessibility wizard
acrobat
adobe acrobat
acrodist
adobe distiller
adaptertroubleshooter
display adapter troubleshooter
appwiz.cpl
add/remove programs control
azman.msc
authorization manager
bitlockerwizard
bitlocker wizard
calc
calculator
certmgr.msc
certificate manager
charmap
character map
chkdsk
check disk utility
ciadv.msc
indexing service
cleanmgr
disk cleanup utility
cliconfg
sql client configaration
clipbrd
clipboard viewer
cmd
command prompt
colorcpl
color management
compmgmt.msc
computer management
compmgmtlauncher
computer management launcher
conf
netmeeting
control access.cpl
accessibility options
control admintools
administrative tools
control appwiz.cpl,,1
add/remove programs w/add new programs preselected
control appwiz.cpl,,2
add/remove programs w/add remove windows components preselected
control appwiz.cpl,,3
add/remove programs w/set program access & defaults preselected
control color
display properties (w/appearance tab preselected)
control
control panel
control desktop
desktop properties
control folders
folder properties
control fonts
fonts
control keyboard
keyboard properties
control mouse
mouse properties
control netconnections
network connections
control printers
printer and fax options
control schedtasks
scheduled tasks
control userpassword2
user accounts
credwiz
credential backup and restore wizard
dcomcnfg
component services
ddeshare
dde share
desk.cpl
display properties
devmgmt.msc
device manager
dfrg.msc
disk defragment
dfrgui
defragment user interface
dialer
phone dialer
directx.cpl
directx control panel
diskmgmt.msc
disk management
diskpart
disk partition manager
dpinst
driver package installer
dpiscaling
dpi scaling
drwtsn32
dr. watson system troubleshooting utility
dvdplay
dvd player
dxdiag
direct x troubleshooter
eudcedit
private character editor
eventvwr
event viewer
excel
microsoft excel
explorer
windows explorer
findfast.cpl
findfast
firefox
firefox browser
firewall.cpl
windows firewall
firewallcontrolpanel
firewall control panel
firewallsettings
firewall settings
fonts
fonts folder
freecell
free cell card game
frontpg
microsoft frontpage
fsmgmt.msc
shared folders
fsquirt
bluetooth transfer wizard
fvenotify
bitlocker notifier
fxscover
fax cover sheet editor
gpedit.msc
group policy editor
hdwwiz.cpl
add new hardware wizard
helpctr
help and support center
helppane
help pane
hypertrm
hyperterminal
icwconn1
internet connection wizard
iexplore
internet explorer
iexpress
iexpress wizard (self extracting package creator)
imageready
adobe imageready
inetcpl.cpl
internet properties
inetwiz
internet setup wizard
intl.cpl
regional and language options
ipconfig /all
ip configuration (display connection configuration)
ipconfig /displaydns
ip configuration (display dns cache contents)
ipconfig /flushdns
ip configuration (delete dns cache contents)
ipconfig /registerdns
ip configuration (refreshes dhcp & re-registers dns)
ipconfig /release
ip configuration (release all connections)
ipconfig /renew
ip configuration (renew all connections)
ipconfig /setclassid
ip configuration (modifies dhcp class id)
ipconfig /showclassid
ip configuration (display dhcp class id)
iscsicpl
iscsi initiator
javaws
java control panel
joy.cpl
game controllers
jpicpl32.cpl
java control panel
logoff
logoff from windows
lpksetup
language pack installer
lusrmgr.msc
local users and groups
magnify
windows magnifier
mailto
opens default email client
main.cpl
mouse properties
mblctr
windows mobility center
migwiz
files and settings transfer tool
mmsys.cpl
multimedia properties control
mobsync
microsoft synchronization center
moviemk
microsoft movie maker
mrt
malicious software removal tool
msaccess
microsoft access
msconfig
system configuration utility
msdt
microsoft support diagnostic tool
mshearts
hearts card game
msimn
outlook express
msinfo32
system information
msmsgs
windows messenger
mspaint
microsoft paint
msra
remote assistance
mstsc
remote desktop
ncpa.cpl
network connections
nero
nero
netplwiz
user accounts
netsetup.cpl
network setup wizard
notepad
notepad
ntbackup
windows backup utility
ntmsmgr.msc
removable storage
ntmsoprq.msc
removable storage operator requests
nusrmgr.cpl
user account management
nvtuicpl.cpl
nview desktop manager
odbccp32.cpl
odbc data source administrator
optionalfeatures
optional features manager
osk
on screen keyboard
p2phost
people near me
packager
object packager
password.cpl
password properties
pbrush
paint
perfmon
performance monitor
photoshop
adobe photoshop
pinball
pinball game
powercfg.cpl
power configuration
powerpnt
microsoft powerpoint
prefetch
windows prefetcher
presentationsettings
presentation settings
printbrmui
printer migration
printers
printers folder
quicktime.cpl
quicktime
quicktimeplayer
quicktime player
rasphone
remote access phonebook
realplay
real player
regedit
registry editor
regedit32
registry editor (Windows 2000)
rekeywiz
encryption file system
rsop.msc
resultant set of policies
sdclt
windows backup utility
secpol.msc
local security settings
services.msc
list of services
sethc
accessibility settings
sfc /cachesize=x
system file checker utility (set cache size to size x)
sfc /purgecache
system file checker utility (purge file cache)
sfc /revert
system file checker utility (return scan setting to default)
sfc /scanboot
system file checker utility (scan on every boot)
sfc /scannow
system file checker utility (scan immediately)
sfc /scanonce
system file checker utility (scan once at next boot)
shrpubw
windows share creation wizard
shutdown
shuts down windows
sigverif
file signature verification tool
slui
software licensing/windows activation
sndvol
sound volume
snippingtool
snipping tool (an advanced print screen function)
soundrecorder
sound recorder
spider
spider solitaire card game
sticpl.cpl
scanner and camera control
stikynot
sticky notes
sysdm.cpl
system properties
sysedit
system configuration editor
syskey
windows system security tool
system.ini
windows loading information
systempropertiesadvanced
system properties (advanced preselected)
systempropertiescomputername
system properties (computer name preselected)
systempropertiesdataexecutionprevention
system properties (data execution prevention preselected)
systempropertieshardware
system properties (hardware preselected)
systempropertiesperformance
system properties (performance preselected)
systempropertiesprotection
system properties (protection preselected)
systempropertiesremote
system properties (remote preselected)
tabcal
digitizer calibration tool
taskmgr
task manager
tcptest
tcp tester
telephon.cpl
phone and modem options
telnet
telnet client
timedate.cpl
date and time properties
tourstart
windows xp tour wizard
tpminit
trusted platform module
tweakui
tweak ui
utilman
utility manager
verifier
driver verifier utility
waaucpl.cpl
automatic updates
wab
windows address book
wabmig
windows address book import utility
wercon
problem reports and solutions
wf.msc
windows firewall with advanced security
wfs
windows fax and scan
wiaacmgr
windows picture import wizard
win.ini
windows loading information
winchat
microsoft chat
winmine
minesweeper game
winver
windows version
winword
microsoft word
wmimgmt.msc
windows management infrastructure
wmplayer
windows media player
write
wordpad
wscui.cpl
security center
wuapp
windows update app manager
wupdmgr
windows update launches
wusa
windows standalone update manager