All posts by Thuli Setlhapo

My name is Thulaganyo Setlhapo, in short you can say Thuli. I was born on the 28th of November 1996. Since i was about 10 years old, that is when I realised that I have much love for computers and gadgets. As for my career i am interested in any type of job concerning I.T profession. This blog I initially created it for resolving anyone who is having difficulties related on: -computers -mobile/cellphones -gadgets -tablets -internet -cyber security... And many more. I also created this blog to share the knowledge that i have about computer tips and tricks onto others, and as I carry on I will in the meantime be learning and exploring a sense of my career choice. As a part of me out of the technology world, i also enjoy listening to music, especially deep house music, and enjoy being a Dj. Since i was young, i also had the dream on becoming a pilot, which i still follow today, but i am not really quite sure if it is really my thing or not, because i don't really have any info about piloting. I am also a quiet person at first sight, but once i get to know you well, you will realize that I am a really humorous person and caring too. That's all that i can say about me, even though there are still a number of personalities that i can share with you.

15 CMD Commands Every Windows User Should Know

Microsoft has slowly but surely pushed the command line aside in the Windows interface. This is not without reason, as it’s an antiquated and mostly unnecessary tool from an era of text-based input that has long passed.

But there still are some commands that remain useful, and Windows 8 even added new features. Here are the commands every Windows user needs to know.

In case you’re not sure how to access the command prompt, forgot basic commands, or would like to know how to see a list of  switches for each command, you can refer to our beginners guide to the Windows command line for instructions.

ASSOC

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command “assoc” to display a full list of file extensions and the programs they’re connected with.

You can also extend the command to change file associations. For example, “assoc .txt=” will change the file association for text files to whatever program you enter after the equal sign. The ASSOC command itself will reveal both the extension names and program names, which will help you properly use this command. You can probably do this more easily in the GUI, but the command line interface is a perfectly functional alternative.

Cipher

Ads by Google

Deleting files on a mechanical hard drive doesn’t really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until they’re overwritten with new data, which can take some time.

The cipher command, however, can be used to wipe a directory by writing random data to it. To wipe your C drive, for example, you’d use the command “cipher /w:c”, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out files you need by running this command.

There’s also a host of other cipher commands, however, they are generally redundant with Bitlocker enabled versions of Windows.

Driverquery

Drivers remain among the most important software installed on a PC. Improperly configured or missing drivers can cause all sorts of trouble, so its good to have access to a list of what’s on your PC. That’s exactly what the “driverquery” command does. You can extend it to “driverquery -v” to obtain more information including the directory in which the driver is installed.

File Compare

This command can be used to identify differences in text between two files, and is particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type “fc” and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing “/b” compares only binary output, “/c” disregards the case of text in the comparison, and “/l” only compares ASCII text.

So, for example, you could use the following:

fc /l “C:\Program Files (x86)\example1.doc” “C:\Program Files (x86)\example2.doc”

to compare ASCII text in two word documents.

Ipconfig

This command relays the IP address that your computer is currently using. However, if you’re behind a router (like most computers today), you’ll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. “ipconfig /release” followed by “ipconfig /renew” can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn’t available. You can also use “ipconfig /flushdns” to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

Netstat

Entering the command “netstat -an” will provide you with a list of currently open ports and related IP addresses. You’ll also be told what state the port is in – listening, established or closed. This is a great command if you’re trying to troubleshoot the devices your PC is connected to or you’re afraid you’re infected with a Trojan and are trying to locate a malicious connection.

Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That’s where ping comes in handy. Typing “ping” followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there’s something blocking communication between the device and your computer. This can help you decide if an issue is caused by improper configuration or a failure of network hardware.

Pathping

This is a more advanced version of ping that’s useful if there are multiple routers between your PC and the device you’re testing. Like ping, you use this command by typing “pathping” followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Tracert

The “tracert” command is similar to pathping. Once again, type “tracert” followed by the IP address or domain you’d like to trace. You’ll receive information about each step in the route between your PC and the target. Unlike pathping, however, tracert also tracks how much time (in milliseconds) each hop between servers or devices takes.

Powercfg

Powercfg is a very powerful command for managing and tracking how your computer uses energy. You can use the command “powercfg /hibernate on” and “powercfg /hibernate off” to manage hibernation, and you can also use the command “powercfg /a” to view the power-saving states currently available on your PC.

Another useful command is “powercfg /devicequery s1_supported” which displays a list of devices on your computer that support connected standby. When enabled, these devices can be used to bring your computer out of standby – even remotely. You can enable this by selecting the device in Device Manager, opening its properties, going to the Power Management tab and then checking the “Allow this device to wake the computer” box.

“Powercfg /lastwake” will show you what device last woke your PC from a sleep state. You can use this command to troubleshoot your PC if it seems to wake from sleep at random.

The “powercfg /energy” command can be used to build a detailed power consumption report for your PC, which is output to a directory indicated after the command finishes. This report will let you know of any system faults that might increase power consumption, like devices that are blocking certain sleep modes, or which aren’t properly configured to respond to your power management settings.

Windows 8 added “powercfg /batteryreport”, which provides a detailed analysis of battery use, if applicable. Normally output to your Windows user directory, the report provides details about the time and length of charge and discharge cycles, lifetime average battery life, and estimated battery capacity.

Shutdown

As of Windows 8/8.1 there is now a shutdown command that – you guessed it! – shuts down your computer. This is of course redundant with the already easily accessed shutdown button, but what’s not redundant is the “shutdown /r /o” command, which restarts your PC and launches the Advanced Start Options menu, which is where you can access Safe Mode and Windows recovery utilities. This is useful if you want to restart your computer for troubleshooting purposes.

System File Checker

System File Checker is an automatic scan and repair tool that focuses on Windows system files. You will need to run the command prompt with administrator privileges and enter the command “sfc /scannow”. If any corrupt or missing files are found, they’ll be automatically replaced using cached copies kept by Windows for just that purpose. The command can require a half-hour to run on older notebooks.

Recovery Image

Virtually all Windows 8/8.1 computers ship from the factory with a recovery image, but the image may include bloatware you’d rather not have re-installed. Once you’ve un-installed the software you can create a new image using the “recimg” command. Entering this command presents a very detailed explanation of how to use it. You must have administrator privileges to use the recimg command, and you can only access the custom recovery image you create via the Windows 8 “refresh” feature.

Tasklist

The “tasklist” command can be used to provide a current list of all tasks running on your PC. Though somewhat redundant with Task Manager, the command may sometimes find tasks hidden from view in that utility.

There’s also a wide range of modifiers. “Tasklist -svc” shows services related to each task, “tasklist -v” can be used to obtain more detail on each task, and “tasklist -m” can be used to locate .dll files associated with active tasks. These commands are useful for advanced troubleshooting.

Taskkill

Tasks that appear in the “tasklist” command will have an executable and process ID (a four-digit number) associated with them. You can force stop a program using “taskkill -im” followed by the executable’s name, or “taskkill -pid” followed by the process ID. Again, this is a bit redundant with Task Manager, but may be used to kill otherwise unresponsive or hidden programs.

Conclusion

This article doesn’t cover every Windows command available. There are literally hundreds of them when all variables are included. Most, however, are no longer useful because they’ve been replaced by more convenient menus in the Windows GUI or simply aren’t commonly used (telnet, for example).

You can check out our Windows command cheat sheet for an expanded list ordownload Microsoft’s command line reference guide for advanced support and troubleshooting.

Which commands do you find yourself using frequently?

HOW TO CLEAN YOUR RAM USING NOTEPAD

image

Steps to Clean Your RAM Using Notepad:

Step 1: Open Notepad

Step 2: Type FreeMem=Space(10240000000)

Step 3: Save it as “CLEANER.VBS” in any location you like.

Step 4: You can edit the code and write 512 instead of 1024 if you own a 512mb RAM or change to anything you like.

Step 5: Run it !

After this final step your RAM will be free. .

HOW TO KNOW ADMIN PASSWORD THROUGH GUEST ACCOUNT

image

1) Go to C:/windows/system32.
2) Copy cmd.exe and paste it on
desktop.
3) Rename cmd.exe to sethc.exe.
4) Copy the new sethc.exe to system
32,when windows asks for overwriting
the file,then click yes.
5) Now Log out from your guest
account and at the user select
window,press shift key 5 times.
6) Instead of Sticky Key confirmation
dialog,command prompt with full
administrator privileges will open.
7) Now type “ NET USER
ADMINISTRATOR “zzz” where “zzz”
can be any password you like and press enter.
8) You will see “ The Command
completed successfully” and then exit
the command prompt and login into
administrator with your new
password.
9) Bravo !! Now You have hacked admin
through guest account.

How To View Facebook Locked Profile Picture?

image

1. Open the facebook profile of person whose profile picture is locked or is set to private.

2. Right click on the profile picture and click on Copy
Image Url as shown in image below.
Facebook Private Profile Photo

3.Open that image in new tab by right clicking and
selecting Paste (CTRL + V)

4. Now change the value of image size highlighted
below which might be s160x160 to s720x720 (If
its not clear try (s320x320)
Facebook Private Profile Photo

5. The image will enlarge in size.

This trick does not
always work!!!

Facebook video scam: 15 seconds? Don’t watch it at all

image

98 Percent Of People Cant Watch This Video For More Than 15 Seconds CLICK LINK TO WATCH VIDEO & SEE HOW LONG YOU
CAN LAST!!

Needless to say, clicking the link is not a good idea.
It’s a survey scam: if you do follow the link, it takes
you to a fake Facebook page that looks as if it
contains a video, but if you click the “play” button,
it loads a “Share” box so that you can irritate all
your friends by spamming them with the same message, and then the survey scam. In case you
haven’t met these before – I know, not very likely if
you have a Facebook account – it’s not there for
your benefit: the scammers get paid commission for
your clicks, and there is no video to “reward” you.
Well, I suppose it is unwatchable, but not for its gross content… Now I’m going to return to my Sunday evening
relaxation and try not to think about why anyone
would want to watch a video like this. (Evidently,
promises of gross content are good social
engineering: this one is spreading far and wide.)
publisher: Thulaganyo Setlhapo
David Harley CITP FBCS CISSP ESET Senior Research Fellow Author David Harley, ESET

HOW TO DOWNLOAD YOUTUBE VIDEOS

image

How To Download YouTube
Video From Mobile Without
Using Any Software

1) Open YouTube from your mobile browser and open the video you want to download.

2) The url of your video will be something like this
E.g. “http://m.youtube.com/watch?v=QJJsJb5KLvg

3) Now edit the URL ,
– replace “m.” (including the fullstop) with:
“ss” ,

4) After replacing your URL, should look something like this:
http://ssyoutube.com/watch?v=4kIrWqwWPslfo

5) Click on go
– The new URL will redirect you to A new page where you will see
different options to download your file.

If you want to Download video
from your computer then you can
also use this trick . just
replace the ” www. ” to ” ss
then click on go , after that
you can download the youtube video .

SHUTDOWN YOUR PC WITH YOUR CELLPHONE

The requirements are simple….One
cell phone with GPRS enabled,
Microsoft Outlook on the pc to be
put to shutdown.
Using this method the user can
shutdown, restart, hibernate the
computer just by sending an email
from their cell phone.
All you need to have is Microsoft
outlook which comes with Microsoft
word. The Microsoft outlook should
be installed on the pc you wish to
shutdown.
First you need to create a batch file
to perform shutdown etc .you can
write them down yourself.

* Open your notepad and type the
following
c:\windows\syst -em32\shutdown -s –
f -t 00
And save it as shutdown.bat
(Executable file)

* Open up Microsoft outlook .make
sure that it is already configured for
you email id.

* Now we will need to set Microsoft
outlook in such a way that outlook
checks your email every
minute.This can be set by going to
tools-à options

* Then click the mail setup tab and
later send/receive button

* Make sure that you schedule an
automatic send/ -receive…every box
checked and set the number of
minutes to 1.Now you may close all
these dialog boxes

* Now go to tools—rules and alert.
Next click on options button on the
upper right hand corner and press
the import rules button

* Now click on the shutdown.bat
which you recently created

* Now the final step

* When you send the message from
your phone to your email address
with a subject shutdown or
sms shutdown%% ……and Abracadabra your
computer will shutdown….

TROJAN HORSE

image

Most of you may be curious to know about how to make a Trojan or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you how to make a simple trojan on your own using the C programming language.
This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run.
So, I’ll call this as Space Eater Trojan. Since this program is written using a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download at the end of this post. Let’s see how this trojan works:
Before I move on to explain the working of this program, you need to know what exactly is a Trojan horse and how it works. Unlike what many of us think, a trojan horse is not a virus. In simple words, it is just a program that appears to do a favorable task but in reality performs undisclosed malicious functions that allow the attacker to gain unauthorized access to the host machine or cause a damage to the computer.

Now let’s move on to the working of our Trojan:

The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result, the the root drive gets filled up completely with in minutes of running this program.
Once the disk space is full, the trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any of the cleanup program. This is because, the trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extension it is often ignored by the disk cleanup software. Hence there is now way to recover the hard disk space other than reformatting the drive.

The algorithm of the Trojan is as follows:

1. Search for the root drive.

2. Navigate to %systemroot%\Windows\System32 on the root drive.

3. Create the file named “spceshot.dll“.

4. Start dumping the junk data onto the above file and keep increasing its size until the drive is full.

5. Once the drive is full, stop the process.

You can download the Trojan source code HERE. Please note that I have not included the executable for security reasons. You need to compile it to obtain the executable.

How to compile the program?

For step-by-step compilation guide, refer my post How to compile C Programs.

How to test this trojan horse?

To test the trojan, just run the SpaceEater.exe file on your computer. It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space.

NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.

How to fix the damage and free up the space?

To remove the damage and free up the space, just type the following in the “run” dialog box:
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.

 NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file?

PLEASE LEAVE A FEEDBACK.