Posts

How to hide folder with command prompt in windows

Yes, you can hide folder with cmd just you have to run a single line command in windows.

Have you ever hesitated to give your laptop to someone just because you have some folders where you have kept your personal images or whatever. You don’t have to hesitate any more. we can hide any folder without installing any third party software on your machine.

lets say you have folder called Personal under D drive.

perform the below step which will make hidden in the disk also you wont get the result when you search anywhere on the pc.


    Press windowkey+R: Run command dialogue box appears.
    Now type "cmd" and hit enter. A command prompt window displays.
    Now type "attrib +s +h D:\Personal" and hit enter.
    The folder "Personal" will be hidden now.

    (To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')



Also read :

Tips to create super strong passwords easely
Change your passw…

What to do when twitter locks your account

Image
Twitter does some crazy things when we forget our login password.

So, let's have a look into what to do when you twitter locks your account..




It locks user account if tried too many failed password attempts for 30 minutes or in some cases 1hr too.
 Twitter does not want to provide access to the hackers to crack passwords, so it temporarily disable the user account for security reason.

At some time point of time you may remember password after many attempts. Try login with the password if it is still not allowing to access your account you need to check any third party apps such as Hoot suite. In some cases these apps will contact again and again to twitter account which can also be a problem that you are not able to login to your account.

Let’s say you really forgot your password, it is not at all coming to your mind, twitter has an option called reset password. Click on that and request for a new password from twitter. Which will sent you reset message to your registered email i…

How to share a folder / shared folder in windows server using windows PowerShell with example

Quite easy, with a one-liner. Windows Server 2012 provides Windows PowerShell cmdlets and WMI objects to manage SMB file servers and SMB file shares. The SMB cmdlets are packaged into two modules called SmbShare and SmbWitness. These modules are automatically loaded (thanks to new module auto-loading feature) whenever you refer to any of the cmdlets included. No upfront configuration is required. Note: Check the output of Get-Module command before and after you run the following one-liner to see that SmbShare module is loaded behind the scenes.)

New-SmbShare –Name MyShare –Path C:\Test –Description ‘Test Shared Folder’ –FullAccess Administrator –ChangeAccess DouglasAdams -ReadAccess Everyone

Credit : http://powershellmagazine.com

How to install Windows PowerShell Web Access (PSWA)

Windows PowerShell Web Access is a new feature in Windows Server 2012. It acts as a gateway, and from there you can run Windows PowerShell commands on any machines in your environment. The webpage is entirely Javascript-based, so you can access the console on almost any device with a web browser. You can install and configure PSWA for testing purposes in three easy steps:

Install-WindowsFeature -Name WindowsPowerShellWebAccess –Verbose

Install-PswaWebApplication -UseTestCertificateAdd-PswaAuthorizationRule -UserName * -ComputerName * -ConfigurationName *

# open the Windows PowerShell Web Access

start-Process https:/dc.contoso.com/pswa

Credit : http://powershellmagazine.com

How to do a schedule job using Windows Power shell with example

How to do a schedule job using Windows Power shell with example

Job scheduling allows you to schedule execution of a Windows PowerShell background job for a later time. First thing you do is create a job trigger. This defines when the job will execute. Then you use the

 Register-ScheduledJob cmdlet

 to actually register the job on the system. In the following example, every day at 3am we back up our important files:

$trigger = New-JobTrigger -Daily -At 3am

Register-ScheduledJob -Name DailyBackup -Trigger $trigger -ScriptBlock {Copy-Item

 c:\ImportantFiles d:\Backup$((Get-Date).ToFileTime()) -Recurse -Force -PassThru}

Once the trigger has fired and the job has run, you can work with it the same way you do with regular background jobs:

Import-Module PSScheduledJobGet-Job -Name DailyBackup | Receive-Job

You can start a scheduled job manually, rather than waiting for the trigger to fire:

Start-Job -DefinitionName DailyBackup

Credit : http://powershellmagazine.com

List of known issues with ProLiant servers and Windows 2008 R2 SP1 | Known issues and workarounds

Known issues and workarounds

Lists known issues with ProLiant servers and Windows 2008 R2 SP1.

Issue Details

Issue 1 :

 Windows 2008 R2 SP1 does not install on the HP ProLiant Servers configured with the Intel 82801FR SATA RAID Controller.

Description :  While installing the OS, the SATA hard drives connected to the Intel 82801FR SATA

RAID controller do not appear when selecting the drive for the OS.

Solution :  Download the latest Intel 82801FR SATA RAID controller driver from the HP website

and use that driver during the Windows 2008 R2 SP1 installation.

To manually install the missing driver, go to Device Manager, and then select “Adaptec

HostRAID SCSI Processor Device.”

Issue 2 :

Hibernation fails on Windows 2008 R2 SP1 installed on ProLiant Server.

Description :  ProLiant Servers with Windows 2008 R2 SP1 installed will not hibernate.

Workaround  : Microsoft will release the hot fix KB2496744 to resolve this issue.

Windows Server 2008 R2 SP1 key features

Windows Server 2008 R2 SP1 key features:
Dynamic Memory in the Hyper-V role : Efficient use of available physical memory :
Memory pool that all virtual machines can use Memory dynamically added or removed based on current workloads Tested on guest virtual machines (VMs) that run any the following OSs:
Microsoft Windows Server 2003 SP2 Datacenter or Enterprise edition Microsoft Windows Server 2008 SP1 Datacenter or Enterprise edition Microsoft Windows Server 2008 R2 Datacenter or Enterprise edition Microsoft Windows Vista® SP2 Enterprise or Ultimate edition Microsoft® Windows 7® Enterprise or Ultimate editions Direct Access Enhanced : Scalability and high availability Enhanced support for Managed service accounts (MSAs) : MSAs can be used on domain member services in perimeter Networks Performance tuning for service providers : Supports an increased volume of authentication traffic on domain controllers located on high latency networks.
RemoteFX : Adds mainstream USB device support 
               …

How to open two Skype accounts at the same time in windows

Yes it is possible.!

We can run two Skype accounts on Windows machine at the same time. To do that you have to go to Start-> Run

Type the below command - Do not exclude quotes and click OK

If you use 32 bit operating systems:

"C:\Program Files\Skype\Phone\Skype.exe" /secondary

64 bit operating systems:

"C:\Program Files (x86)\Skype\Phone\Skype.exe" /secondary

Also read :

Tips to create super strong passwords easely
Change your password right now - Heartbleed
Write one liner Batch Script to Take Your File Backup
7 Types of Dangerous Virus
2 Software to Keep Your Passwords Safe and Secure

Learning Basic VI commands and shortcuts

It might useful for Linux beginners.


Command Mode
 Default mode of vim
 Move by character: Arrow Keys, h, j, k, l
 Move by word: w, b
 Move by sentence: ), (
 Move by paragraph: }, {
 Jump to line x: xG
 Jump to end: G

Insert mode
 i begins insert mode at the cursor
 A append to end of line
 I insert at beginning of line
 o insert new a line (below)
 O insert new line (above

Ex Mode
o :w writes (saves) the file to disk
o :wq writes and quits
o :q! quits, even if changes are lost

Manipulating Text
    change (c)
    cut (d)
    yank (y)
    paste (p) without target

Line in Action

    Line as in action
    Letter l
    Word w
    Sentence ahead )
    Sentence behind (
    Paragraph above {
    Paragraph below }

Undoing Changes (Command Mode)
    u undo most recent change.
    U undo all changes to the current line since the cursor landed on the line.
    Ctrl-r redo last "undone" change

Multiple windows

    Multiple documents in multiple windows
  …

How to use IF in bash shell script with example

If condition with sample bash script
Now, you can use the if statement to test a condition. If command the general syntax is as follows:

if condition
then
command1
command2
...
commandN
fi

If given condition is true than the command1, command2..commandN are executed. Otherwise script continues
If the condition is true then the following commands get executed. If not the script continues with the next command.
 Let’s have a practical example for this.
Open a text editor and create the script called check.sh:

#!/bin/bash
read -p "Enter a password" password
if test "$password" == "LinuxAdmin"
then
echo "Password verified."
fi

Save and close the file. Give executable permission to check.sh to do so type following command:

chmod +x check.sh
 ./check.sh

Sample Outputs:

Enter a password : LinuxAdmin
Password verified.
Let’s check what if we give wrong password - Run it again:

./check.sh

Sample Output:

Enter a password : ServerAdmin

 the script does not print any message a…

Types of Security Attacks on Network

Image
Security attacks break the security barrier of the network and access the network resources . There are two types of security attacks carried on a network.

Passive Attack - Defines an attack where an attacker just monitors the network. The attackers aim is not to alter the traffic but to just monitor what information is being transmitted over a network. This compromises the confidentiality of the data being transmitted. At any moment , the attacker can capture the traffic.



Active Attack - Defines an attack in which an attacker causes damage to the data being transmitted over a network. The attacker deletes ,  adds or alters information that is being transmitted over the network.

The purpose of security attacks is to violate the protection over the network and to access the network traffic and resources. The other types of attacks that are carried over a network are as follows:

Denial of Service (DOS) - Defines the most offensive type of attack on a network resources. These types of atta…

System does not start though fans are working - Troubleshoot

In some cases, you may not be able to access the drivers and the video also may not work. If the system does not start up, but the system fans work fine, it is mostly either a motherboard or CPU problem.

1 - Remove the CPU and restart it on the motherboard

2 - Check the seating of the CPU on the motherboard and ensure that is locked down

3 - Ensure that the motherboard power supply is properly connected

4 - Check all the ribbon cables to see that they are connected to the appropriate drives and are oriented properly

5 - Reset the BIOS settings to default

6 - Try the sage booting procedure with power up defaults , by referring to the motherboard manual

7 - If the system does not start up , the memory , CPU or motherboard are faulty

8 - Remove any additional memory and try starting with the minimum memory. Then swap the memory and try starting the same. if the system starts with either of the memories , then the other memory is faulty.

9 - Check all jumpers and connections on the mothe…

Easy and simple keyboard shortcuts for Lotus Notes

Lotus Notes also provides various keyboard shortcuts for navigating through different interfaces. To perform navigation, Lotus Notes uses the standard Microsoft Windows navigation keys.

The commonly used keyboard shortcuts for Lotus Notes:


alt+BOpen bookmark listalt+F5Restore Lotus Notes to default minimized sizeArrow KeysNavigate within embedded components and objects , such as buttons on home pagealt+7 then Arrow Keys then EnterMove position of active windowalt+8 then Arrow Keys then EnterChange size of the windowalt+9Minimize active windowalt+10Maximize active windowctrl+tabMove to next windows tabctrl+F6Switch between open windowsaltAccess menu barF6Move to next pane or frameShift+alt+SOpen Search menuShift+ctrl+tabMove to previous window tabSpacebarOpen selected embedded element on home pageF1Get help on current featurectrl+Q or Alt+F4Exit Lotus Notes

How to access BIOS on different Computer manufactures

At some point of time working with different computer manufactures PC or Laptop it is unknown that how to access BIOS on the particular machine. Below are some useful info on accessing BIOS on HP,Dell,Acer,IBM,Sony,Toshiba and so on.


Acer F1,F2,Ctrl+Alt+EscCompaq F10Dell 4400 F12Dell Inspiron F2Dell Latitude Fn+F1 (While booted)Dell Latitude F2 (On boot)Dell Optiplex Del or F2Dell Precision F2HP F1,F2 (Laptop Esc)IBM F1Sony VAIO F2Sony VAIO F3Toshiba Esc

BIOS Beep Codes and Solutions

When a system is first powered on, the system runs a POST. If error are encountered during the POST, you usually see a text error message displayed on screen. Errors that occur very early in the POST may occur before the video card is initialized. These types of errors can not be displayed, so the system uses a series of beeps for communicating the error messages. the system pauses if any of the hardware connected to the system is not functioning properly.

Below are AMI BIOS beep codes and Description with Solutions:


1 short beepDRAM refresh failureClean the memory contacts and
 reinstall it2 short beepMemory parity circuit failureClean the memory contacts and
 reinstall it3 short beepBase 64K RAM failureClean the memory contacts and
 reinstall it4 short beepSystem timer failureChcek the motherboard installation
 for any loose contacts5 short beepProcessor failureCheck the processor and hear sink
are properly installed OR check the
 Motherboard6 short beepKeyboard cont…

Set pattern lock in computer just like android

Image
Billions of people they use Android phones most of them lock their phone with pattern lock. Why because It is just easy and user friendly.let us see how to lock your computer with pattern lock. just we need to install a free software which will enable a lock feature to your system.


Eusing Maze Lock:

This software is absolutely free. with the help of Eusing Maze Lock today we are going to lock our computer...

Click here to download the software





Install it on your computer, once the installation completes, you will be prompted to set a pattern to lock your computer. Choose how ever you want it and do not forget it , that would be your password from now!

If your friends or any stranger tries to access your computer with wrong pattern for 3 times,the software will start giving warning with siren...! :) Isn't it interesting?!

So, What are you waiting for...download it and have fun..



(If you are not able to download the software please let me know in the below comment session I will try t…

Tips to create super strong passwords easely

Image
Simplest way to create a super strong passwords for your online websites.



A strongest password should have :

-at least right characters long
-should not contain your username or company name
-should not be a dictionary word
-should not be similar to your old password
-should be mixture of Uppercase letters, lowercase letters,numbers,Symbols.


Easy tip to remember your strong passwords:

I love my mom - !L0veMyM0m$
I love cricket - 1L0v3Cr!ck37

If you create in this way you will be able to remember your password and also it is very much difficult to hack.

Change your password right now - Heartbleed

Image
" The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. 



SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs). "

http://heartbleed.com/

Change your passwords of :

Facebook
Twitter
Pinterest
Google 
Tumblr
Flickr
Linkedin
Slideshare
Yahoo!
AOL 
Hotmail
Dropbox
Soundcloud

These are the most popular sites and applications. I'd recommend you to have stronger password for all your websites.

Click here How to create a strong password.


Directories in LINUX for Beginners

Directory: /bin
/bin contains the binaries which are needed to run LINUX.
Directory: /boot
/boot has all the files required for booting LINUX on system.
Directory: /dev
/dev has the devices for all the files.
Directory: /etc
/etc contains the configuration files of the various software.
Normally no one touch this directory.
- Directory: /home
/home is like My Documents in Windows.
This contains the username as the sub directory.
- Directory: /lib
/lib contains the libraries required fo r the system files.
- Directory: /lost+found
/lost+found contains the files which are damaged or which are not linked to
any directory
These damages are due to the incorrect shutdown.
- Directory: /mnt
This is the directory in which we mount the devices and other file systems.
- Directory: /opt
Here the optional softwares are installed.
- Directory: /root
The directory for the user root

35 Basic and Important Commands of Linux OS

When we start using Linux at least we should know the below basic commands.
1. ls -l To list  the files as well as directories those are kept in the particular working directory
Syntax
[root@sonaby]#ls -l
2. ls -la Same use as 'ls -l' but  this command helps to see the hidden files.
Syntax
 [root@sonaby]#ls -la
3. ls -li Same as 'ls -la' but it will also shows the Inode number of each and every file
Syntax
 [root@sonaby]#ls -li
4. ls To see only file name.
Syntax
 [root@sonaby]#ls
5. clear To clear the screen (short cut Ctrl+l)
Syntax
 [root@sonaby]#clear
6. exit To end a current session
Syntax
 [root@sonaby]exit
7. touch To create a new empty file
Syntax
 [root@sonaby]#touch
8. cd To change the working/present directory
Syntax
 [root@sonaby]#cd /home/test
9. cat To view the contents of a file and it is also used for creating a new file with some contents
Syntax
 [root@sonaby]#cat <file name> to view file contents
10. mkdir To make a new directory
Syntax
 [root@sonaby]#mkdir newdirname
You ca…