Sunday, 27 December 2015

How To Remove Short-Cut Virus From Your PC Using Windows CMD (Command Prompt)

First and foremost, it's advisable you update your Anti-virus to see how it all goes and if this doesn't solve the issue, you can proceed to the methods below. Apart from updating your Antivirus,there are some softwares capable of getting rid of this virus. The best of them are listed below;

1. SVRTool.exe

2. Autorun Exterminator

3. Smadav shortcut virus remover

4. Wnload Combofix shortcut remover

So, download any of those and follow the instructions on the sites to use them.

1. Manual fixes are also available to solve this problem.Therefore,you can make use of any method you consider easier.

a). Insert whichever drive is infected by this virus into your system and check the drive's extension i.e. A: .... Z: from ‘My Computer’,

b). Click on Start » Run / Winkey+R and type cmd in the textbox provided - Hit Enter.

c). Copy paste the code below into the command prompt and hit 'Enter'.
         attrib -h -r -s /s /d E:\*.*

PLEASE NOTE THAT; You will have to change E: to your drive's extension.)

d). Now,check to confirm that the virus has been completely cleared-off. Else, you can use this alternative outlined below.

a). Go to the control panel to untick “Hide protected operating system files” or simply use the search box.

b.)Navigate to “C:\Windows\System32” and manually delete regsvr

c.)If you can't find the file in System32, then try locating it in “C:\program files”. If you still cannot find it there,then try locating it in the “Processes” tab in Task Manager.

Now, with all the software & manual fixes highlighted above,one is bound to work for the drive.

Friday, 25 December 2015

How To Password Protect Your USB Flash Drive

Everyone now a days has one or two additional USB flash drives and hard disks with them because USB flash drives makes sharing of data very easy and fast. You can share large files very easily because downloading the same file from the internet would take a very long time and also utilize our data. So instead, we prefer to take that file from a friend who has that file. We can share very heavy files using USB flash drives because now you can even buy a USB flash drive with a storage capacity of 512 GB.
Not only sharing of Movies and videos, some people even share very personal data using pendrive. What if the pendrive gets lost somewhere. Is the data still Safe? Can someone else access that file except me? Of course, if you have not set a password on your USB flash drive.
Here’s how to protect your USB flash drive with a password without any software.
Just follow the steps outlined below to set a password on your USB flash drive.
Step 1:- Insert the USB flash drive which you want to protect in your Computer.
Step 2:-  Open My computer.
Step 3:- Right click on your USB flash drive and click on Turn on BitLocker.
Step 4:- Now enter the password which you want to set.
Step 5:- Click next. Now it will give you some alternative methods by which you can recover back your USB flash drive if you forgot your password. Then you can use this file as a password.
Step 6:- Save that file to your computer and again click next.
NOTE: Copy the encrypted file into several locations (most reliably cloud drives) should in case you forget your password so you can easily use it to recover your password when you have forgotten it because without this, you cannot decrypt the USB flash drive when you forget your password.

Thursday, 24 December 2015

Merry Xmas To All Afrikan Children.

Are You No More Different From The Government of Today's World? Prove It! Go Look For A Homeless, Displaced, Orphaned etc. Afrikan Child and Put A Smile on His/Her Face Today As A Mark of Celebration of the Xmas Festivity.
Merry Xmas... To All The Homeless, Displaced, Orphaned, Abandoned, Malnourished etc. Children Out There. May Someone Make This Xmas Worthwhile for You All as We Celebrate The Season.

Wednesday, 16 December 2015

Between the COAS and the Shiite's: What Yardstick for Boundary.

It's high time we defined where and what our boundaries and limits as a body, bodies, group or groups are in the country of ours. It is very obvious that people and organizations or groups have begun to violate public order and peace all under the excuse of human rights and protests. The recent protest and confrontation between the team of escort and the Shiites at Zaria, Kaduna is an example of such violations and this calls for a proper definition of "boundaries" to the citizens and people of Nigeria. On watching the video and other videos of the incident on YouTube and other news channels one will shocked to discover that the team of soldiers and the COAS are in NO WAY wrong to have metted such action on the group following the way the Generals and his soldiers pleaded with the protesters that they "the Army" are just passing through and should be allowed to go for their duty. Lest you forgot, these soldiers have sworn with their lives to defend the sovereignty and integrity of this nation and as such, were on a trip to go discuss one or two of such measures they will be employing in protecting our nation when these group of protesters, the Shiites, barricaded the road. I watched in dismay, the total disregard of human rights and peace and order by this group as they were being pleaded with by the General and his team for up to 15mins only to have this group delay and violate their right to passage and freedom of movement (of the soldiers). One begins to wonder if these people actually believe the "soldiers" and our "military" in general don't have their rights as humans or if they (the Shiites) believe they have higher rights than the soldiers. This issue should not be politicized to favour any region, group or what have you in any part of this country, whatsoever, in anyway for it will only escalate the menace. Like I saw somewhere on one social network community "I have never seen in any movie where soldiers are begin civilians to allow them (the soldiers) exercise their rightful given human rights" yet, these soldiers spent more than twenty minutes begging and pleading with these Shiites to allow them through to their function. Also, the Iranians protesting should be termed enemies of democracy because this video proves that the Shiites is just another time bomb of insurgency waiting to explode. Enough is too much, no group(s) holds more rights than any individual or group(s) in the world over so, they should be held responsible for manslaughter. Not the COAS or the Army. Let's call a spade a spade and fix the round peg in a round hole.

Watch Video Here

Sunday, 8 November 2015

How To Hide Your Private Files in a JPEG Image

Okay, this may sound incredible to you but yeah, it's not magic and no programming skill is required to do this. All you need is just follow these basics to hide important files in any of your photo/image on your system.
1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder
-The image will hereby be referred to in all examples as pix.jpg
-The file will hereby be referred to in all examples as NewTextDoc.txt
2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)
3. Open command prompt by going to Start > Run > cmd
4. In Command Prompt, navigate to the folder where your two files are by typing cd location [ex: cd C:\New Folder]
5. Type [copy /b pix.jpg + secret.rar pix.jpg] (don't forget to remove the brackets).
Now, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file(s).
In order to view/extract your file, there are two options that you can take
a) Change the file extension from pix.jpg to pix.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there.

Friday, 23 October 2015

How To Detect/Differentiate A Real/Fake Facebook Account

Okay, good morning peeps. Today's article was inspired by an inquisitive colleague of mine who is very keen on protecting himself from potential online fraudsters and whom fears the integrity of his personal data on social network. We were having lunch at the Senior Staff Cafeteria when he popped the discussion and after several dabbling here and there, he passed his phone to me showing a friend request he just got from a beautiful supposed Brazilian lady. This colleague has never traveled to the Southern Americas before and there wasn't any mutual relationship between him, his friend list and the supposed Brazilian lady (i.e. he wasn't sharing any mutual friend with this lady) so he was very concerned as to how the lady got to know him so, he couldn't comprehend the link that warranted the friend request. Thus he asked me "how do I detect/differentiate a real from fake Facebook account"? That was when I took to explaining the different available techniques with which he could do that.
Here, I'll begin a series of lectures on just how to do that and I'll do that in one technique per post.
I'll start with the easiest technique. It is a very simple one that uses the profile picture of the account and doing the usual google search. Do not be worried, I promise you it's an easy one. The steps are as outlined below;
1. Go to the face book account you are suspecting,
2. Right click on the profile picture to release a drop down menu,
3. Select " Copy Image Link" or "Copy Image Location/Link" (depending on your browser),
4. Open another tab in your browser,
5. Open google search and paste the copied link,
6. Then press enter, go or search (again, depending on your device) then wait for the results.
You'll see results of the different sites that the image has been used on and if the first 5 results does not have at least 3 that bears semblance or same name and image as the account you are suspecting then that account is fake/fraudulent.
I have attached some image results I googled to this blog to enable your comprehension of the above technique so, thank me by sharing this post link across your family, friends, loved ones and colleague and... Dont forget to hit the like button and leave me your comments and enquiries. I'm sure there are a couple of articles like this one on the internet so, feel free to ask Google (the Oga at the Top). ☺

How To Detect/Differentiate A Real/Fake Facebook Account.

Okay, good morning peeps. Today's article was inspired by an inquisitive colleague of mine who is very keen on protecting himself from potential online fraudsters and whom fears the integrity of his personal data on social network. We were having lunch at the Senior Staff Cafeteria when he popped the discussion and after several dabbling here and there, he passed his phone to me showing a friend request he just got from a beautiful supposed Brazilian lady. This colleague has never traveled to the Southern Americas before and there wasn't any mutual relationship between him, his friend list and the supposed Brazilian lady (i.e. he wasn't sharing any mutual friend with this lady) so he was very concerned as to how the lady got to know him so, he couldn't comprehend the link that warranted the friend request. Thus he asked me "how do I detect/differentiate a real from fake Facebook account"? That was when I took to explaining the different available techniques with which he could do that.
Here, I'll begin a series of lectures on just how to do that and I'll do that in one technique per post.
I'll start with the easiest technique. It is a very simple one that uses the profile picture of the account and doing the usual google search. Do not be worried, I promise you it's an easy one. The steps are as outlined below;
1. Go to the face book account you are suspecting,
2. Right click on the profile picture to release a drop down menu,
3. Select " Copy Image Link" or "Copy Image Location/Link" (depending on your browser),
4. Open another tab in your browser,
5. Open google search and paste the copied link,
6. Then press enter, go or search (again, depending on your device) then wait for the results.
You'll see results of the different sites that the image has been used on and if the first 5 results does not have at least 3 that bears semblance or same name and image as the account you are suspecting then that account is fake/fraudulent.
I have attached some image results I googled to this blog to enable your comprehension of the above technique so, thank me by sharing this post link across your family, friends, loved ones and colleague and... Dont forget to hit the like button and leave me your comments and enquiries. I'm sure there are a couple of articles like this one on the internet so, feel free to ask Google (the Oga at the Top). ☺