Showing posts with label ANTIVIRUS. Show all posts
Showing posts with label ANTIVIRUS. Show all posts

How To Show Hidden Files & Folders in USB Drive / Pendrive (Virus Removal)

Have you wondered where your files have gone from your USB Drive without deleting them? Are you searching for your files saved on your Pendrive? Well, if you are facing the same problem, you are in a big trouble. Your USB Drive or Pendrive got affected by virus. Basically, this thing happened only due to viruses. USB Drives are the very first thing to spread viruses from one PC to the another. Just because of that, you won’t be able to view your saved files and folders from your Pendrives and USB Drives. To get all of your files back, you have to get rid of that virus. If you got stuck with the same problem, you have to follow the below given tutorial. How to show hidden files & folders in USB Drive, is very well explained in the following tutorial. Useful details are as follows!
Remove virus from Pendrive
Basically there are plenty of ways to see hidden files and folders from your USB Drive, however, your Pendrive got affected by Virus and for that you have to remove that particular virus from your pendrive to see your saved files and folders, which are being hidden by Virus. To remove this virus and see all of your files, you just need to follow the below steps.

How To Show Hidden Files & Folders in USB Drive / Pendrive (Virus Removal)

Step 1 :
The very first thing you need to do is insert your Pendrive or USB Drive into a USB port of your PC.
Step 2 :
Once your device get recognised, go to My Computer and see the assigned letter to your Pendrive. It could either be F drive or E Drive or something else, you have to remember it for a while.
Step 3 :
Now, open Command Prompt Window of your PC. To do so, go to your Start Menu and hit the Run option. In run box, enter cmd and hit the enter button. This way you can get the command prompt window displayed on your screen.
Step 4 : 
After this, you should see a cursor on your Command Prompt to enter our text. Here you have to enter the Pendrive’s drive letter. If your USB Drive is showed as drive J enter J and hit the enter button.
Step 5 :
After this, you have to manually type in the folder or file’s name is being missed or hidden. You have to navigate to that particular file or folder. If you don’t know the exact way of doing this, type in CD in capital letters and hit the enter button. There you can see a list of all the files from which you have to select the missing files.
Step 6 :
For example if a folder named tekplz is being missed from the drive, you have to type in the following command into the command prompt window. Make sure to type the exact letters including all the given actions.
attrib “tekplz” – h
After typing the above command, hit the Enter button.
Step 7 :
You’re done! You have successfully removed the actual virus from your USB Drive. You can get the access of that particular file or folder which was missed from your drive. To do so, follow the below path.
My Computer>> Go to your USB Drive>> Click on to the Drive>> tekplz
See, this is how you actually can get all of your hidden files and folders from your USB Drive. If you are from a non tech background, you can ask for any technical person’s help who can follow the above given steps from your Windows PC.
The next way to unhide manually hidden files is from your own Windows PC. Windows allows you to hide particular files and folders from your drive so that no once can see those files and folders easily. If you don’t know the way of unhide or hiding the files, follow the below path.
Go to Organize option, which can be found under the address bar and then click on to the View option. You would see a new Window with a number of different options. There you would have two different options with radio button. Here you can select a proper button whether to hide the files or to unhide them. You can easily make changes to the files right from here instantly!
What’s your take? Did you find it a helpful tutorial? Do let us know your views and opinions on the above tutorial. If you know any other way to see hidden files or to remove virus from Pendrive, do share your thoughts and experiences with us. Meanwhile, if you have any other questions or queries or any doubts, kindly put your words as a comment below the comment section. We would like to interact with you regarding the tutorial. Your feedback and suggestions are always welcomed!

How To Add Twitter Timeline Widgets On Blog

Twitter is more conscious about twitter widgets and tweet buttons for websites and blogs.As part of this  twitter developed more features on their widgets.Earlier times,there had only Tweets widgets which displays your tweets. Today morning,twitter introduced new widgets for favorite tweets,List tweets and Hash tag search.
And you can publish any users timeline tweets (public) on your websites.

How To Add this Widget on your Blog ?

  • Go to Widgets settings on your twitter account. (https://twitter.com/settings/widgets) .
  • Click on 'Create new" button on right side  of the particular page.
  • Choose your  Timeline source, and scroll down your page and click on 'Create Widget' button.
  • Copy down the Code and Paste in HTML/Java script Box in your Blog.
  • Now Go to Blogger.com --> Layout --> Click on 'Add a Gadget'  --> and Choose HTML/Javascript widget from the list.
  • Paste this code and Save. Refresh your blog and see your tweets on your blog.

Has your website or WordPress blog been hacked?

Is your site displaying the “This site may be hacked ” warning at Google.com or Bing.com?
Web site hacked or web site blocked by Google?
With over 15 years experience, and a long list of “verifiable” satisfied customer service testimonials, The Hack Repair Guy™ will remove malware, work to fix website security issues, recommend free techniques to monitor and prevent future attacks, install WordPress security plugins, and even repair basic WordPress errors; all for a reasonable flat rate, no matter how long it takes to resolve. Heroic Customer Service— it’s what we do! 

We clean most infected sites of malware within two hours and unblacklist websites within 24 hours. Why choose HackRepair.com?

  • Service
    We’ll discuss your situation by phone to determine how quickly we can repair your website.
  • Expedience
    We’ll clear your website of malicious scripts and malware then get your web site back up and running quickly. We are WordPress CMS experts as well.
  • Comprehensive
    We’ll help recover and unblock your site within Google and help you in clearing any Google.com or Bing.com website listing issues.
  • Education
    Our goal is to help prevent your website from being hacked again. We install security and security monitoring plugins, and will train you on how to use them free of charge as well.
  • And don’t forget our money back guarantee!


How can we guarantee we will clear & recover your hacked website?

video testimonial for hackrepair.com
  • We’ve been securing websites since 1997.
  • We have developed a range of tools to help quickly identify and clear malicious scripts or hacker code from your website pages.
  • Our friendly, knowledgeable staff is ready and available to assist you on your schedule.
  • We do not outsource our work; everything is done in-house here, in the USA.
  • We will work directly with Google on your behalf to ensure your website is unblocked within Google.com or Bing.com as quickly as possible.

Don’t let your reputation be ruined as a reported attack page. Call
(619) 479-6637 or toll-free (800) 639-6442, and let us help to repair your reputation immediately!



Other Common hack related terms and information relating to how to clear hacked websites:
  • iframe hack – sometimes called an iframe injection is often used by hackers to redirect visitors to other websites or force a software download upon visiting the hacked website.
  • Base64 code – is a common means hackers code their web page hacks. This obfuscated code makes it harder to find hacker code on a web page. A server admin searching a server for hack related text may often miss files injected with obfuscated base64 PHP code because the obfuscated code conceals the usual suspect phrases. The “pharma hack” often uses base64 or obfuscated coding.
  • Botnet – is a large collection of hacked PCs, sometimes called zombie computers. These PCs once controlled may be used to send junk e-mail or bring down web services. Botnet’s are often the means by which denial of service attacks are initiated.
  • ‘hacked by hacker’ – was a well known server wide compromise which took advantage of a vulnerability relating to the symbolic links setting within cPanel configured web servers. A number of web hosts fell prey to this cPanel related exploit, which allowed hackers to replace most of the “index” type pages of accounts configured on server with a text file containing the words, ‘hacked by hacker’.
  • Zero-Day exploit – Affecting both websites and computers, the zero-Day exploit is a term describing not yet documented security threats or vulnerabilities.
  • Denial of service attack – or distributed denial of service attack (DDoS), is a distributed attack on a network or service. Because these types of attacks originate from so many locations simultaneously they often result in hours of downtime until mitigated.
  •  
  • Common search engine and web browser alert messages include:
    Google – ‘This site may be hacked.’
    Google – ‘This site may harm your computer.’
    Google – ‘This site may harm your device’
    Google – ‘This site may be compromised’
    Bing and Twitter – ‘unsafe link’
    Chrome – ‘Warning: Something’s Not Right Here!’
    Chrome – ‘Danger: Malware Ahead!’
    Firefox – ‘Reported Attack Site!’
    Internet Explorer – ‘This website has been reported as unsafe’
    Opera – ‘Fraud Warning’
    Safari – ‘Warning: Visiting this site may harm your computer’
    Yahoo – ‘Warning: Hacking Risks’

Avast licence 2050 Year (New Update)

আপনার এভাষ্টকে 2050 সাল পর্যন্ত একটিভ করুন
প্রথমে Avast! Internet Security 8.0 ডাউন লোড করুন এখান থেকে
.এরপর Avast! Internet Security Crack ডাউন লোড করুন এখান থেকে:
.এখন Avast! Internet Security 8.0 সেট-আপ করুন।
.সেট-আপ শেষে রিস্টার্ট চাইবে। রিস্টার্ট করুন
রিস্টার্ট হওয়ার পর Avast open করুন, ‍Settings- ক্লিক করুন। একটি উইন্ডো ওপেন হবে। সেখানে Troubleshooting-ক্লিক করুন। Enable Avast self- defense module থেকে টিক চিহ্ন তুলে দিন। এরপর OK- তে ক্লিক করুন।
.যারা XP ব্যবহার করেন তাঁরা AVAST XP ZeNiX.reg ফাইলে ডাবল ক্লিক করুন এবং Yes করুন। (যাঁরা 7&8 ব্যবহার করেনতাঁদের ফাইলটিতে ক্লিক করার দরকার নেই) [ফাইলগুলো avast_8_crack_till_2050.rar  পাওয়া যাবে]
.এবার Avast License 2050 ZeNiX ফাইলটি ইনস্টল করুন। ইনস্টল করার সময় পাসওয়ার্ড চাইলে ZeNiX দিন।ইনস্টল শেষেরিস্টার্ট করুন। [ফাইলগুলো avast_8_crack_till_2050.rar  পাওয়া যাবে]
.রিস্টার্ট শেষে Avast 8 License ফাইলে ডাবল ক্লিক করুন এবং Yes করুন। [ফাইলগুলো avast_8_crack_till_2050.rar পাওয়া যাবে]
এরপর Avast open করুন, ‍Settings- ক্লিক করুন। একটি উইন্ডো ওপেন হবে। সেখানে Troubleshooting- ক্লিক করুন।Enable Avast self- defense module থেকে টিক চিহ্ন দিন। এরপর OK- তে ক্লিক করুন।
১০রিস্টার্ট করুন।
১১এরপর  আপনার এভাষ্ট এর লাইসেন্স  দেখুন 2050 সাল পর্যন্ত  একটিভ হয়ে গেছে
১২এখন Avast! Internet Security 8.0 কে নিয়মিত আপডেট করুন আর ভাইরাসকে বাটামপেটা করে তাড়িয়ে দিন।