Get Glass Effect Command prompt in Windows7 and Vista

transpracy thumb Get Glass Effect Command prompt in Windows7 and Vista

If you use command prompt in windows 7 or vista and wants to give some cool look to your command prompt this might be the coolest way for you . A developer called Komalo has developed a wonderful and very small script which works in best possible way. It create transparency in command prompt that enables glass effect in command prompt windows. This is the best possible way to get out of your black dirty command prompt for most of the user who are geeky and often use it.

You can simply download the script and double click on it to take effect. After existing from this script you can see your command prompt back to normal. So you don’t have to worry about install and uninstall it back if you don’t want it. Simply open it get the glass effect. Close the script Glass effect gone.
Link: Download
The file is in rar format extract the file and run Glass CMD under the folder .  Take a look at video tutorial for full Demonstration.

Video Demonstration

How to Remove malware from website

malware How to Remove malware from websiteAt morning with some cup of tea I stand in front of my laptop to check my website. I try to login into the admin panel. Certainly I got the message the malware has been detected in my website. The website hasn’t got any problem before I went to sleep.  I was astound by looking at this message. I haven’t face this sort of problem before. I thought the problem is just simple and will sorted out simply by contact hosting company for support. This problem has been faced in the same blog you are reading just couple of days before. I am using WordPressto build my blog and using Justhost webhosting services.
I try talk with online support but I didn’t get relevant answer from them. They urge me to request a ticket for it.  I request a ticket with my problem and get the following answer from the hosting company.
Please open your website and go to ‘Why my website was blocked’. You will have to follow Google instructions to have your website unblocked. Then you will have to wait until your site is re-indexed by Google. Unfortunately, it is beyond our capability to settle this issue.
justhost notice thumb How to Remove malware from website

Now the problem occurs as I have to solve my problem all by myself. This problem new to me. I Though it was quite easy just to restore the back that I have. Since I backup my blog daily its not a big problem for me. But when I check my other website that I was hosting on same account. All the website has been infected. Now the problem seems more complicated. Since I don’t have backup available for all my website. I just have only one option left and the option is not that simple I myself have to understand about the problem and find the necessary solution of it.  Therefore I have follow the necessary steps  that could be essential for you to eradicate this problem. Please note that the vulnerability and nature of malware defers from website to website.

1. Log in into Google webmaster and Find the problem root cause.

Google Website has one of good option to demonstrate the information about the malware. This is very useful in this situation. After logging into your account and choosing your domain name(if you have added my domain in webmaster account) You will be notify about the malware of page that it has infected. The first step that you should take is to find out the root cause of the problem.
In my case. Three post including the main page has been detected and other numerous website has been effective hosting on same domain.

2. Change everything password of your Cpanel , ftp account, database

To ensure that any hackers is trying to hack your website. Its always a good idea to change the password of everything. Please note that hackers are not always the case to spread malware.

3. Talk with your webhosting company.

Its always the good ideal to tell what’s happen to your hosting company. In most case webhosting company seems supportive. Mention your problem with full description so that they can help. If you hosting company refuse to help you like mine. All you need to do is find out the solution of your problem yourself. However if you know the exact time when the problem was likely to be seen in your website. You can ask hosting company to restore your data from their backup to the earlier period of malware detection.

4. Malicious File

In most case the hacker try to to include some malicious script that will redirect all the user or website visitor to different website that contains malware. The file can be injected by an hackers in different ways. Sometimes it can be into files on your webserver. In my case. In have found two file in public_html(web root where all file has been stored). that’s in the main pages. Its easier for to to find it out because I am using wordpress and there shouldn’t be any javascript file in the main root directory. I have found two different file with bundle of script on it. Please note that the hacker sometimes only inject a pointer to .js

5. Redirection in .htaccess file

.htaccess file is the major tools used by hackers. Hackers modify the .htaccess file and redirect your user to other website. In my case there is no any .htaccess modification
You can find more about .htaaccess attack from this pages

6. Ensure that you computer is malware free.

As you probably know your login info can be taken from your browser’s cache by some virus, then credentials to access your hosting account can be delivered and used by somebody else. So, the most vulnerable place can be your own PC and I do advise you to have some good anti-virus software.

7.  Script under hidden I frame.

Iframe is another way to inject malware in your website. Iframe know and inline frame  is a certain section of webpages that loads content from another webpages.  I have found iframe in root directory and remove it.
<iframe src="http://somewebsite.info/in.php width=0 height=0 frameborder-0" width="320" height="240"></iframe>
Final Step: Patience is the most important things if you are facing this problem. Google will take at least a day to recheck your website and remove warning from you website. When you feel you have done all necessary things you can request for your malware review via Google webmaster tools.  Please note that it tooks 2 days for me for the removal of malware warning from Google.

6 Best tips for Gmail user for better optimizing your Gmail

Gmail tips and tricks 300x151 6 Best tips for Gmail user for better optimizing your Gmail Are you Gmail user? There are various tweaks you can do with gmail thats enable you various features thats inside gmail. User of different extension available for your webbrowser makes easy to check your email, add professional signature, notification of email etc. Here are the 6 different tips for Gmail user for better Optimization of Gmail

1. Schedule your Gmail Email

schedule your gmail email 6 Best tips for Gmail user for better optimizing your Gmail
Assume that you have to send email to your boos when you will be in holiday with your friend. It will be absurd to do such things when you are enjoying something else in life or When you don’t want to. Such suitation is just normal you might have other different suitation where you have to send email when you don’t want to. In such suitation you can use Boomerang extension for Gmail to schedule your gmail email. Its pretty easy just install the extension and schedule your email when you want to  send.  Behind scheduling the gmail Boomerang also helps to block the incoming email by just shifting them to folder from your inbox and bring it back to the message list at the specified time. Again at the time of holiday if you want to hide message from work or boss its an awesome way for your. Here are the diferent.

2 Use Preview Plane in Gmail

Enable preview pane 6 Best tips for Gmail user for better optimizing your Gmail
This is the recent features that helps to see you the preview of your mail. You can enable this features from Google lab. The full Tutorial is listed here. This helps to make your Gmail looks same like Yahoo and Hotmail features with preview your email.

3. Organize your email with Priorities

New gmail 6 Best tips for Gmail user for better optimizing your Gmail
The new features in Gmail helps to organize your email with different priorities like Unread First, Important first, Starred first. Now you can easily get the email according to your priorities. You can also Organize it in tab See the above screeshot to use it properly.

4. Check email from Chrome Browser.

mail check.plus  6 Best tips for Gmail user for better optimizing your Gmail
This is another awesome chrome extension for Gmail and Chrome user. You don’t have to sing in into your Gmail account to check your email. Simple install extension called mail check plus and you can check your email right from your Webbrowser like in screenshot above.

5. Create Awesome Email Signature

wisestamp 6 Best tips for Gmail user for better optimizing your Gmail
You can create create an wonderful Email Signature with the chrome extension called WiseStamp. Wisestamp create ans awesome email signature with the help of template and other different application see below tutorial to know more about it.
Video Tutorial to use Gmail signature with wisestamp

6. Record Important Call in Google Voice

You can record Important call in Google voice.  The recording procedure is so simple and works both on android and Iphone.

How to remove BIOS password

Forgetting the password in BIOS create a hectic situation to all computer user. Its not that easy to recover your password in BIOS like in other program or websites. It’s a complicated stuff and most of all suffer from this problem . BIOS stands Basic Input/Output System is a set of instruction that a computer uses to successfully start operating. There are several method to reset your BIOS password.

Remove CMOS battery

cmos battery thumb How to remove BIOS password
The easiest way and work on most system is to remove CMOS battery. A computer will remember the time and keep the time up to date due the CMOS battery. Therefore if we take out this battery, the computer will forgets is different hardware setting including BIOS password. Put the battery back after  30 second.

Using MotherBoard Jumper

motherboard jumper thumb How to remove BIOS password
You should know about your motherbroad band. if you don’t know about it read the manual. The jumper has been label as CLR, CLEAR, CLEAR CMOS etc by most of the manufacture. There are 3 pins in the jumper and the middle pin will be joining to either left or right pin. Now remove the jumper and join the left pin to the opposite pin. for example if the jumper join to the middle pin to the right pin, then remove it and join middle pin to the right pin. After few second again remove the jumper and join middle pin to the right pin. Restart your PC .
I strongly suggest you to see the video to know about hardware parts beforing making any changes in hardware.

How to reset BIOS password USING command Prompt

You can simply reset the BIOS password from command prompt using microcontroller programming. Just follow the below steps simply
Go to your control panel(Window+r) Type cmd
First of you should start debug mode. Type debug. Then the debug mode will be operate. Please note you won’t see C:UsersYourname in this case. So don’t be panic.
  1. A Press Enter
  2. MOV AX,0 Press Enter
  3. MOV AX,CX Press Enter
  4. OUT 70,AL Press Enter
  5. MOV AX,0 Press Enter
  6. OUT 71,AL Press Enter
  7. INC CX Press Enter
  8. CMP CX,100 Press Enter
  9. JB 103 Press Enter
  10. INT 20 Press Enter
  11. Press Enter
  12. Press Enter
  13. Press Enter
Note: Enter belongs to Hit Enter not type Enter
Below command helps to clear the BIOS so that whever you start you pc next time it won’t ask your for the password. Therefore If you will be able to bring DOS prompt up. The BIOS setting can be change to default. For this process Go to command prompt.
Type DEBUG and hti Enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter
Restart you computer to take effect

How to enable Clean new design in Gmail

The previous design was working fine for me. But after rolling out to the new design view I was astound by the clean amazing look I got. See the below screen shot to find the differences between the Classic and the new design.
Classic Gmail 1024x559 How to enable Clean new design in Gmail
Click to Enlarge
New Interface:
You can activate new interface by Clicking Setting>>Theme>>Preview Theme. The new design in more cleaner and elegant than the previous one. Google is rolling its new design to all its service. Soon it will be the default layout for your Gmail. Till then you can use the preview theme for enable this layout. Morever Google has launch few more stuff in its Google lab like preview pane features make it more outstanding like other email provider in terms of design.
new gmail layout preview 1024x559 How to enable Clean new design in Gmail

How to Create Your Own Customized Run Commands

Run commandThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command

 
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
Create Shortcut
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.

How to Identify and Avoid Phishing Scams

Phishing ScamPhishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.
 

Identifying a Phishing Scam

 
1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
  • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
  • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
  • papyal.com
  • paypal.org
  • verify-paypal.com
  • xyz.com/paypal/verify-account/
 

Tips to Avoid Being a Victim of Phishing

 
1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN as shown below.
HTTPS Address Bar


In most cases, unlike a legitimate website, a phishing website or a spoofed webpage will not use a secure connection and does not show up the lock icon. So, absence of such security features can be a clear indication of phishing attack. Always double-check the security features of the webpage before entering any of your personal information.
4. Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches being applied.
5. Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:
You can directly send an email to spam@uce.gov orreportphishing@antiphishing.org reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov.
 
Tutorials © 2011 | Designed by Ibu Hamil, in collaboration with Uncharted 3 News, MW3 Clans and Black Ops