How to hide folder with command prompt in windows




Yes, you can hide folder with cmd just you have to run a single line command in windows.

Have you ever hesitated to give your laptop to someone just because you have some folders where you have kept your personal images or whatever. You don’t have to hesitate any more. we can hide any folder without installing any third party software on your machine.

lets say you have folder called Personal under D drive.

perform the below step which will make hidden in the disk also you wont get the result when you search anywhere on the pc.


    Press windowkey+R: Run command dialogue box appears.
    Now type "cmd" and hit enter. A command prompt window displays.
    Now type "attrib +s +h D:\Personal" and hit enter.
    The folder "Personal" will be hidden now.

    (To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')



Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure




What to do when twitter locks your account





Twitter does some crazy things when we forget our login password.

So, let's have a look into what to do when you twitter locks your account..

What to do when twitter locks your account
What to do when twitter locks your account



It locks user account if tried too many failed password attempts for 30 minutes or in some cases 1hr too.
 Twitter does not want to provide access to the hackers to crack passwords, so it temporarily disable the user account for security reason.

At some time point of time you may remember password after many attempts. Try login with the password if it is still not allowing to access your account you need to check any third party apps such as Hoot suite. In some cases these apps will contact again and again to twitter account which can also be a problem that you are not able to login to your account.

Let’s say you really forgot your password, it is not at all coming to your mind, twitter has an option called reset password. Click on that and request for a new password from twitter. Which will sent you reset message to your registered email id. If you can’t find out the mail from twitter in your inbox try searching in spam folder.

It shouldn’t take more than 5 minutes to receive the confirmation email.



Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure

How to share a folder / shared folder in windows server using windows PowerShell with example

Quite easy, with a one-liner. Windows Server 2012 provides Windows PowerShell cmdlets and WMI objects to manage SMB file servers and SMB file shares. The SMB cmdlets are packaged into two modules called SmbShare and SmbWitness. These modules are automatically loaded (thanks to new module auto-loading feature) whenever you refer to any of the cmdlets included. No upfront configuration is required. Note: Check the output of Get-Module command before and after you run the following one-liner to see that SmbShare module is loaded behind the scenes.)

New-SmbShare –Name MyShare –Path C:\Test –Description ‘Test Shared Folder’ –FullAccess Administrator –ChangeAccess DouglasAdams -ReadAccess Everyone


Credit : http://powershellmagazine.com

How to install Windows PowerShell Web Access (PSWA)



Windows PowerShell Web Access is a new feature in Windows Server 2012. It acts as a gateway, and from there you can run Windows PowerShell commands on any machines in your environment. The webpage is entirely Javascript-based, so you can access the console on almost any device with a web browser. You can install and configure PSWA for testing purposes in three easy steps:

Install-WindowsFeature -Name WindowsPowerShellWebAccess –Verbose

Install-PswaWebApplication -UseTestCertificateAdd-PswaAuthorizationRule -UserName * -ComputerName * -ConfigurationName *

# open the Windows PowerShell Web Access

start-Process https:/dc.contoso.com/pswa

Credit : http://powershellmagazine.com

How to do a schedule job using Windows Power shell with example



How to do a schedule job using Windows Power shell with example

Job scheduling allows you to schedule execution of a Windows PowerShell background job for a later time. First thing you do is create a job trigger. This defines when the job will execute. Then you use the

 Register-ScheduledJob cmdlet

 to actually register the job on the system. In the following example, every day at 3am we back up our important files:

$trigger = New-JobTrigger -Daily -At 3am

Register-ScheduledJob -Name DailyBackup -Trigger $trigger -ScriptBlock {Copy-Item

 c:\ImportantFiles d:\Backup$((Get-Date).ToFileTime()) -Recurse -Force -PassThru}

Once the trigger has fired and the job has run, you can work with it the same way you do with regular background jobs:

Import-Module PSScheduledJobGet-Job -Name DailyBackup | Receive-Job

You can start a scheduled job manually, rather than waiting for the trigger to fire:

Start-Job -DefinitionName DailyBackup

Credit : http://powershellmagazine.com

List of known issues with ProLiant servers and Windows 2008 R2 SP1 | Known issues and workarounds



Known issues and workarounds

Lists known issues with ProLiant servers and Windows 2008 R2 SP1.

Issue Details

Issue 1 :

 Windows 2008 R2 SP1 does not install on the HP ProLiant Servers configured with the Intel 82801FR SATA RAID Controller.

Description :  While installing the OS, the SATA hard drives connected to the Intel 82801FR SATA

RAID controller do not appear when selecting the drive for the OS.

Solution :  Download the latest Intel 82801FR SATA RAID controller driver from the HP website

and use that driver during the Windows 2008 R2 SP1 installation.

To manually install the missing driver, go to Device Manager, and then select “Adaptec

HostRAID SCSI Processor Device.”

Issue 2 :

Hibernation fails on Windows 2008 R2 SP1 installed on ProLiant Server.

Description :  ProLiant Servers with Windows 2008 R2 SP1 installed will not hibernate.

Workaround  : Microsoft will release the hot fix KB2496744 to resolve this issue.

Windows Server 2008 R2 SP1 key features



Windows Server 2008 R2 SP1 key features:

Dynamic Memory in the Hyper-V role :
 
Efficient use of available physical memory : 
 Memory pool that all virtual machines can use Memory dynamically added or removed based on current workloads Tested on guest virtual machines (VMs) that run any the following OSs:

                        Microsoft Windows Server 2003 SP2 Datacenter or Enterprise edition
                        Microsoft Windows Server 2008 SP1 Datacenter or Enterprise edition
                        Microsoft Windows Server 2008 R2 Datacenter or Enterprise edition
                        Microsoft Windows Vista® SP2 Enterprise or Ultimate edition
                        Microsoft® Windows 7® Enterprise or Ultimate editions
Direct Access Enhanced : Scalability and high availability
Enhanced support for Managed service accounts (MSAs) : MSAs can be used on domain member services in perimeter Networks
Performance tuning for service providers : Supports an increased volume of authentication traffic on domain controllers located on high latency networks.

RemoteFX : Adds mainstream USB device support 
                     Provides a cost-effective, media-rich user experience for virtual desktops
                     Supports latest programming technology, such as Silverlight and Flash


Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure

How to open two Skype accounts at the same time in windows


Yes it is possible.!

We can run two Skype accounts on Windows machine at the same time. To do that you have to go to Start-> Run

Type the below command - Do not exclude quotes and click OK

If you use 32 bit operating systems:

"C:\Program Files\Skype\Phone\Skype.exe" /secondary

64 bit operating systems:

"C:\Program Files (x86)\Skype\Phone\Skype.exe" /secondary

Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure

Learning Basic VI commands and shortcuts


 It might useful for Linux beginners.


Command Mode
 Default mode of vim
 Move by character: Arrow Keys, h, j, k, l
 Move by word: w, b
 Move by sentence: ), (
 Move by paragraph: }, {
 Jump to line x: xG
 Jump to end: G

Insert mode
 i begins insert mode at the cursor
 A append to end of line
 I insert at beginning of line
 o insert new a line (below)
 O insert new line (above

Ex Mode
o :w writes (saves) the file to disk
o :wq writes and quits
o :q! quits, even if changes are lost

Manipulating Text
    change (c)
    cut (d)
    yank (y)
    paste (p) without target
   
Line in Action

    Line as in action
    Letter l
    Word w
    Sentence ahead )
    Sentence behind (
    Paragraph above {
    Paragraph below }

Undoing Changes (Command Mode)

    u undo most recent change.
    U undo all changes to the current line since the cursor landed on the line.
    Ctrl-r redo last "undone" change

Multiple windows

    Multiple documents in multiple windows
    Ctrl-w, s splits the screen horizontally
    Ctrl-w, v splits the screen vertically
    Ctrl-w, Arrow moves between windows
    :q close the current window
    Ex-mode instructions always affect the current window

Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure



How to use IF in bash shell script with example


If condition with sample bash script
Now, you can use the if statement to test a condition. If command the general syntax is as follows:

if condition
then
command1
command2
...
commandN
fi

If given condition is true than the command1, command2..commandN are executed. Otherwise script continues
If the condition is true then the following commands get executed. If not the script continues with the next command.
 Let’s have a practical example for this.
Open a text editor and create the script called check.sh:

#!/bin/bash
read -p "Enter a password" password
if test "$password" == "LinuxAdmin"
then
echo "Password verified."
fi

Save and close the file. Give executable permission to check.sh to do so type following command:

chmod +x check.sh
 ./check.sh

Sample Outputs:

Enter a password : LinuxAdmin
Password verified.
Let’s check what if we give wrong password - Run it again:

./check.sh

Sample Output:

Enter a password : ServerAdmin

 the script does not print any message and script will go to the next statement. Here is another example
We can expand the script by displaying one another additional message in the result.
check.sh:

#!/bin/bash
read -p "Enter your password " password
if test $password == LinuxAdmin
then
echo "Your password is accepted – Thank you.! "
fi
if test $password != LinuxAdmin
then
echo "The entered password is wrong – Sorry.! "
fi

Save and close the file. Run it as follows:

./check.sh

Sample Outputs:

Enter your password  : LinuxAdmin
Your password is accepted – Thank you.!

Run it again enter wrong password.

./check.sh

Sample Outputs:

Enter your password : ServerAdmin
The entered password is wrong – Sorry.!


Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure

Types of Security Attacks on Network



Security attacks break the security barrier of the network and access the network resources . There are two types of security attacks carried on a network.

Passive Attack - Defines an attack where an attacker just monitors the network. The attackers aim is not to alter the traffic but to just monitor what information is being transmitted over a network. This compromises the confidentiality of the data being transmitted. At any moment , the attacker can capture the traffic.

Types of Security Attacks on Network
Types of Security Attacks on Network 


Active Attack - Defines an attack in which an attacker causes damage to the data being transmitted over a network. The attacker deletes ,  adds or alters information that is being transmitted over the network.

The purpose of security attacks is to violate the protection over the network and to access the network traffic and resources. The other types of attacks that are carried over a network are as follows:

Denial of Service (DOS) - Defines the most offensive type of attack on a network resources. These types of attacks are the easiest attacks that can be carried out. In this type of attack, the user or organization is not allowed to access the information that they are entitled to do so. The user may not be able to access his / her email. He may not be able to access the server. For example , the attacker may block the web server of the organization. The users may not be able to access the Web site of the organization.

Virus Attack - Defines an attack in which a particular computer in general is not targeted. Virus is small program that replicates itself and causes harm to the files in the system. In this type of attacks , the virus is transmitted to the main server.This program infects the file of that server. When the user of the intranet accesses that particular file , the program gets copied into his local computer. Thus , the whole intranet may get affected due to the virus.

Password Cracking - Defines an attack in which the attacker comes to know about the user password and gains unauthorized access to network resources.

Domain Name Server DNS Spoofing - Defines an attack where the DNS information is altered and false information is saved into the server. The attacker may send incorrect DNS information over the network. When the user accesses information on the network , he is directed to some other site.

IP Spoofing - Defines an attack in which the attacker uses false IP address to represent himself . The attacker sends information using a false IP address across the network claiming that this IP address is a part of the network.Thus , other clients of the network start transmitting data to this IP address. Thus the attacker gains access to the network resources.

System does not start though fans are working - Troubleshoot



In some cases, you may not be able to access the drivers and the video also may not work. If the system does not start up, but the system fans work fine, it is mostly either a motherboard or CPU problem.

1 - Remove the CPU and restart it on the motherboard

2 - Check the seating of the CPU on the motherboard and ensure that is locked down

3 - Ensure that the motherboard power supply is properly connected

4 - Check all the ribbon cables to see that they are connected to the appropriate drives and are oriented properly

5 - Reset the BIOS settings to default

6 - Try the sage booting procedure with power up defaults , by referring to the motherboard manual

7 - If the system does not start up , the memory , CPU or motherboard are faulty

8 - Remove any additional memory and try starting with the minimum memory. Then swap the memory and try starting the same. if the system starts with either of the memories , then the other memory is faulty.

9 - Check all jumpers and connections on the motherboard

10 - Check the motherboard expansion slots for metal fragments

11 - Replace the CPU on the motherboard . If the system works the CPU is faulty

12 - If the system does not work with the new CPU ,  try placing the CPU on another computer motherboard. If it works then your motherboard is faulty.

Easy and simple keyboard shortcuts for Lotus Notes





Lotus Notes also provides various keyboard shortcuts for navigating through different interfaces. To perform navigation, Lotus Notes uses the standard Microsoft Windows navigation keys.

The commonly used keyboard shortcuts for Lotus Notes:


alt+B Open bookmark list
alt+F5 Restore Lotus Notes to default minimized size
Arrow Keys Navigate within embedded components and objects , such as buttons on home page
alt+7 then Arrow Keys then Enter Move position of active window
alt+8 then Arrow Keys then Enter Change size of the window
alt+9 Minimize active window
alt+10 Maximize active window
ctrl+tab Move to next windows tab
ctrl+F6 Switch between open windows
alt Access menu bar
F6 Move to next pane or frame
Shift+alt+S Open Search menu
Shift+ctrl+tab Move to previous window tab
Spacebar Open selected embedded element on home page
F1 Get help on current feature
ctrl+Q or Alt+F4 Exit Lotus Notes

How to access BIOS on different Computer manufactures


At some point of time working with different computer manufactures PC or Laptop it is unknown that how to access BIOS on the particular machine. Below are some useful info on accessing BIOS on HP,Dell,Acer,IBM,Sony,Toshiba and so on.


Acer  F1,F2,Ctrl+Alt+Esc
Compaq  F10
Dell 4400  F12
Dell Inspiron  F2
Dell Latitude  Fn+F1 (While booted)
Dell Latitude  F2 (On boot)
Dell Optiplex  Del or F2
Dell Precision  F2
HP  F1,F2 (Laptop Esc)
IBM  F1
Sony VAIO  F2
Sony VAIO  F3
Toshiba  Esc

BIOS Beep Codes and Solutions


When a system is first powered on, the system runs a POST. If error are encountered during the POST, you usually see a text error message displayed on screen. Errors that occur very early in the POST may occur before the video card is initialized. These types of errors can not be displayed, so the system uses a series of beeps for communicating the error messages. the system pauses if any of the hardware connected to the system is not functioning properly.

Below are AMI BIOS beep codes and Description with Solutions:


1 short beep DRAM refresh failure Clean the memory contacts and
 reinstall it
2 short beep Memory parity circuit failure Clean the memory contacts and
 reinstall it
3 short beep Base 64K RAM failure Clean the memory contacts and
 reinstall it
4 short beep System timer failure Chcek the motherboard installation
 for any loose contacts
5 short beep Processor failure Check the processor and hear sink
are properly installed OR check the
 Motherboard
6 short beep Keyboard controller Gate A7 error Check or replace the keyboard or
 replace the motherboard and
 processor
7 short beep Processor virtual mode exception error Check the processor and hear sink
 are properly installed OR check
the Motherboard
8 short beep Display memory Read/Write test failure Check the display card is properly
 installed or replace the display card
9 short beep ROM BIOS checksum failure Reflash or replace the ROM BIOS
 chip OR replace the motherboard
10 short beep CMOS shutdown Read/Write error Replace CMOS battery or replace
 the motherboard
11 short beep Cache memory error Check the cache settings in BIOS
setup or replace the motherboard
1 Long 3 Short Conventional/Extended memory failure Clean the memory contacts and
reinstall it
1 Long 8 Shot Display/Retrace test failed Check the display card is properly
 installed or replace the display card