Browse By

Category Archives: Security

Which is the best firewall ??

Hello friends. Nowadays hacking is on a boom. Many popular websites and companies got hacked recently by some hackers. Though we are not big as a company, but still we also need to pay attention towards some security. So for getting rid of viruses we

Remove write protection from USB drive

Once i visited one of my friend’s house. He had some pics of school time in his laptop. So i inserted my usb drive in his laptop, and tried to copy those photos into my usb. Whops! I see a error message. It says “The

check if someone is using your wifi

Check if someone is using your wifi

Nowadays many of us are using Wifi router in our home, as it requires no wire connection and its a bit comfy to use. But have you ever imagined, that your neighbor or someone around you may also be using your wifi connection slowing down your speed. Ofcourse

Unlock your pc

Unlock your PC in pattern style, same as in android

Android has really become one of the popular OS in mobile phones. It is still alive, because of amazing apps it has in playstore, and some of its eyecatching features. Now if you see the most used locking system in Android Phone, is Pattern locking.

Lock computer using USB flash drive

Do you leave your PC or laptop logged in for a short period and go somewhere else? Someone may just steal some important information from your machine. Want a security for your PC, when you leave it? You can lock computer using usb flash drive.

Recover system after virus attack with re-enable

Have your computer/laptop met with a virus attack recently? Have you got some of the services stopped due to it?? Want to recover them???Our Antivirus successfully deletes virus, but it fails to restore many of the services like cmd, task manager.. etc. So why not become independent, and do it

Manually delete trojan using process explorer

A Trojan is a spyware which may give a hacker, remote access to a targeted computer system. Once a Trojan has been installed on a targeted computer system, hackers will have remote access to the computer allowing them to perform all kinds of operations.Your PC