Skip to main content

Posts

Showing posts from June, 2016

Bypassing Windows 7 and Windows 10 Password Reset

Suppose you just designated a new password to your computer account, but you forget it the next time you login. What do you do now? All of your important stuff is there inside that account. Don't worry it's easy and today we are going to show you how to bypass and reset your password . For this you will need one thing : A Linux live cd or if you don;t have this cd then boot a USB with a linux .ISO file (both these will work the same way ),I would suggest Ubuntu Desktop version for this trick though you can use any. If you don't know how to boot a USB with .ISO file Read here  STEP 1: First of all start the computer and go to boot menu and boot this linux live cd / USB drive in your computer. Use Boot key whichever it is in your computer (It can be F12, F4, F6, F8 etc. depending on your computer) Here Choose USB option. STEP 2: Now you will see Ubuntu logo(logo is just ubuntu in letters)  on the screen.It will proceed and ask you for two cho...

How to create Bootable USB using Rufus

Rufus is a great software that allows you to create a bootable USB drive using an .ISO file.Its Ideal for installing programs and software on windows for whom CD drive are not available. In order to create a bootable USB drive you will need three things : 1 USB drive 2 Your .ISO file which you want to boot your USB with. 3. Rufus Let's get going!! STEP 1 First of all download Rufus , you can download it from their site -  https://rufus.akeo.ie/ Download the latest version (right now its Rufus 2.9). You don't need to install it , it runs directly STEP 2 : Inser the USB drive and open Rufus , make sure you take backup of all files in your USB drive because Rufus will format the USB before booting it. STEP 3: Once you have started Rufus check for all desired things. Make sure device field is set to the correct device(device that you want to boot i.e USB) Also Make Sure "Create a bootable disk " option is ticked else i...

How to view saved passwords in google chrome

Sometimes we just forget our passwords, but if you have saved your password in chrome then you can easily access them.Today we are going to learn just that! ,follow the steps to view a saved password. Step-1: At first open Google chrome and go to “settings” (top right  corner ) Step-2: Now scroll down and click “Show advance settings”. Step-3: Then go to “ password and forms” and click “Manage  saved  password” here you must see list of all websites whose passwords are  saved  in the browser will be listed. Step-4: Now select which website password  you  will see. When you click on 'show' the windows will ask for administrator password, just type the admin's password and chrome will display the password you are looking for. Thank You!!

HOW TO STOP SOMEONE’S INTERNET ACCESS

Today we are going to learn a very simple trick which will help you to stop someone's access to internet.Suppose you have a annoying brother who just uses up all your data then you can use this trick. Follow these simple steps: Firstly Open notepad and type @Echo off Ipconfig /release Save this file as Stop.bat and send it to someone. Their IP address will be lost, and therefore they won’t be able to access internet. If you want to fix this ,simply type in IPconfig /renew

Bubble Sort

Bubble Sort is one of the most basic type of sorting algorithm.Today I am going to tell you  how to code it. PROGRAM #include<iostream> using namespace std; int main() {       int a[7];                         // array declaration for(int x=0;x<=6;x++)     //loop for taking input { cout<<"enter the number:"; cin>>a[x];               // input given by user     } // bubble sort starts int i, j, temp;      for (i = 0; i <=6; ++i)      {           for (j = 0; j <= 6 - i; ++j )           {                if (a[j] > a[j+1])     // swap condition                {                   ...

How to find Virus using cmd

Today I am going to show you how to find virus using this simple cmd command.In order to learn how to find the virus and delete it ,just follow the steps given below: Go to search and type cmd,open it. In cmd type cd\ and press enter key and then type 'attrib' and press enter . A list will appear If the file in front of SHR has a .exe or .inf extension , then it means that it is a virus!...If not your PC is safe. How to Delete The Virus type "attrib -s -h -r nameoffile.inf" and press enter key (change name of file to the fie with virus) then type "del nameoffile.inf"  and press enter. In nameoffile type the file name which is infested with virus. Boom! You have deleted the virus now!! Hope it helped ..Thank you :)

Microsoft to buy LinkedIn For $26 Billion

Microsoft announced that it will buy LinkedIn for $26 Billion, it will pay $18 Billion in cash to the the company.The software Giant will pay $196 per share to the  company.The deal is biggest ever for Microsoft and one of the largest in tech industry. With this move the Tech Giant aims to boost sales of its business and email software. The 13 year old LinkedIn has 433 million users worldwide,the acquisition comes at a time when LinkedIn was striving to grow further beyond its reach.Microsoft already has announced that LinkedIn will retain its identity.The company hope to merge Microsoft's office 365 and other products with LinkedIn professional social Network. "The relationship with Microsoft, and the combination of their cloud and LinkedIn's network ,now gives us a chance to change the way the world works" Weiner said in a statement. "This combination will make it possible for new experiences such as a LinkedIn newsfeed that serves up arti...

Software Testing through Fuzzing

Fuzz testing or fuzzing is a software testing technique used to discover coding errors and security loopholes in software, operating systems or networks by inputting massive amounts of random data, called fuzz, to the system in an attempt to make it crash . Fuzzing is  often automated or semi-automated, that  involves providing invalid, unexpected, or random data to the inputs of a computer program. The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. Fuzzing technique is commonly used to test for security problems in software or computer systems ans also used to discover coding errors and security loopholes in software, operating systems  or networks by inputting massive amounts of random data, called fuzz, to the system  in an attempt to make it crash. If a vulnerability is found, a tool called a fuzz tester (or fuzzer), indicates potential causes. There are two forms ...

10 Tips To Make Your PC Secure

These Days many anti social elements  like to access computer of other people. For this Purpose they would use trojans ,viruses worms, malwares etc. the list goes on. So, it is highly important that one should take care of his system and not get trapped into any malicious programs. Therefore  for this purpose I discuss  some tips to make your PC  more secure.   Always use genuine software. Not only using pirated software is illegal but all websites which provide these pirated software downloads are full of malwares and viruses. More than 90 percent of pirated software’s contain worms in their crack file. If you are really serious about security of your accounts and information then genuine software’s are recommended. NO trial Antivirus. Antivirus helps protect from viruses, worms, Trojans etc. But you should update it regularly to be safe from latest threats. Never use trial, free or pirated antivirus programs, most of them are gateway for...

C++ Program for a Palindrome

Following is a C++ Program for a Palindrome #include <iostream> using namespace std ; int main (){ char string1 [ 20 ]; int i , length ; int flag = 0 ; cout << "Enter a string: " ; cin >> string1 ; length = strlen ( string1 ); for ( i = 0 ; i < length ; i ++){ if ( string1 [ i ] != string1 [ length - i - 1 ]){ flag = 1 ; break ; } } if ( flag ) { cout << string1 << " is not a palindrome" << endl ; } else { cout << string1 << " is a palindrome" << endl ; } system ( "pause" ); return 0 ; }

C++ Program to Implement Hash Tables

#include<iostream> #include<cstdlib> #include<string> #include<cstdio> using namespace std ; const int TABLE_SIZE = 128 ;   /*  * HashEntry Class Declaration  */ class HashEntry { public : int key ; int value ; HashEntry ( int key, int value ) { this - > key = key ; this - > value = value ; } } ;   /*  * HashMap Class Declaration  */ class HashMap { private : HashEntry ** table ; public : HashMap ( ) { table = new HashEntry * [ TABLE_SIZE ] ; for ( int i = 0 ; i < TABLE_SIZE ; i ++ ) { table [ i ] = NULL ; } } /*   * Hash Function   */ int HashFunc ( int key ) { return key %...