Unlocker-the essential utility included in newer version of Windows-Available Free to Download

Unlocker-the essential utility included in newer version of Windows-Available Free to Download

Creating or deleting files is a routine process while working on computer, at times we receive annoying  error messages like “Make sure the disk is not full or write-protected and that the file is not currently in use.” Or “The source or destination file may be in use.” Or “Cannot delete file: Access is denied” Or “There has been a sharing violation.” Or “The file is in use by another program or user.” And the most common error message as given below –
 A solutions for this problem(The Unlocker) is included(Pre installed) in the newer versions of Microsoft Windows but if your windows does not have this utility, you can download  The Unlocker  software free of cost from here.

How to unlock a file
To delete a locked file, first you need to unlock it.To unlock a file right click the file name. Now you will see the following on your screen.
 Now click on unlocker. Now a list of locked files will appear with five options marked in the bottom line. 1- No action, 2- Kill Process, 3 – Unlock , 4 – Unlock All and 5 – Quit. Here you have two options (1) If you want to unlock a particular file, select it and click ‘Unlock’ or (2) To unlock all locked files click ‘Unlock All”

ENIAC-The First Computer of the World

 ENIAC-The First Computer of the World

 Yes, the first computer was named as “ENIAC”(Electronic Numerical Integrator and Computer) and was designed in United States of America  by a team of experts of The United States Army's Ballistic Research Laboratory led by Major General Gladeon Marcus Barnes of the United States Army Ordnance Corps as it was primarily needed by the US artillery to calculate artillery firing tables. Project was financed by the Research and Development Command of the U.S. Army. It was supervised by the office of the Chief of Ordnance U S Army.  During  second World War a  secret Construction contract was  signed with Moore School of Electrical Engineering Pennsylvania on 05 June 1943. The project named “Project px” was declared successfully completed and dedicated to the US Republic in the evening of 14 February 1946. The astonished press named it as a “Giant Brain”. This was first programmable machine of the world and after refurbishing in 1947 remained fully operational till 1955.
Image Curtsey-wikipedia.org

The machine “ENIAC”(Electronic Numerical Integrator and Computer) was 100 feet long,  8 feet high on a 3 feet base occupying a total base area of about 1800 square feet.


Approximate weight of the machine was 27250 Kg.


Cost of The machine “ENIAC”(Electronic Numerical Integrator and Computer) was roughly $ 500,000 ( approximately $ 7,000,000 or Rs-437000000-00 today)


Initially the machine’s calculation capability included add and subtract twenty ten -digit decimal number and later divider, square root, multiplier, Reader, Printing with the help of punched cards), and accumulators were  developed. The machine  was capable of 5000 calculations per second.

Power Consumption

The machine consumed 150 Kilo Watt of power to become fully functional. It was established in Philadelphia and whenever the power in the houses dimmed the people used to say that the “ENIAC” has been switched on.

What to do if you face a criminal attack in an ATM Booth

What to do if you face a criminal attack in an ATM Booth

With the increased use of technology, the cyber criminals have also developing their parallel empire. ATM Card Cloning, ATM Card Skimming and PIN tempering are some of the tricks commonly used in ATM frauds. These tricks need a highly skilled person and they commit frauds difficult to trace, but the recent incident of Bangalore city revealed that the criminal hardly knew more about the ATM technology. The Bangalore Police revealed that, Before this incident he had already killed a lady in another ATM Booth. The astonishing thing is that the victim herself was the manager of that ATM. Why she did not know the tricks or she may have surrendered to the nervousness of her mind. Any way here is what we must do –
Image Curtsey-http://greenwatchbd.com
If you are hijacked with your ATM(Automated Teller Machine) Card in an ATM Booth, you can not only save your money, even life but can put the culprit in his right place(The Jail). The only thing you have to do is, never oppose him and keep following his orders. When he says you to withdraw money you put your ATM card in the ATM Card slot as usual without any hesitation. Now he will say you to enter PIN(Personal Identification Number) Here begins your most important and the only role. Here you have to enter your PIN in reverse order. Suppose your PIN is “2345”  then you enter “5432”. The machine will do the rest.

Now, as the Machine receives a reverse PIN, it will come into action and act usually as if it is going to pay you. It will show you the cash gripped very hard and in a way that you can see it but can not take away. During this process the automatic security system will activate and send calls to the nearest Police Station, The Flying Squad(The Police Patrol Van of the area), his branch manager and his mail server. After this The door will be closed and the system will shut down automatically.(For all this activity the system security data like phone numbers must be entered and stored in the software and the system must be kept up to date by the Bank to tackle such situations automatically by the machine him self)

Bloggers Blog, Google will remove your Blog if you commit these mistakes

Bloggers Blog, Google will remove your Blog if you commit these mistakes

Google blog, is a free plat form with very lenient terms. It is very attractive but it strictly follows the fair practice norms and expects the same from you in return. If you violate their conditions your blog will immediately be removed because your blog ig totally in control of Google. Sometimes a legal action may also be initiated by Google if they find the violation is of grievous nature and against the laws. However, a legitimate representation will always be considered. Below are the possible reasons of your  blog deletion –

Porn Contents or engaging in their distribution

When a blogger uploads porn contents on his blog or engage their distribution your blog will be in danger. Google does not like porn contents or nudity at all. Recently Google search engine and Bing search engine the two competitors have agreed on the request of the British Premier to work jointly on a project to make it difficult to search porn sites. But, you must mark your blog as 'adult' in your Blogger settings. Otherwise, Google may put it behind a 'mature content' interstitial.

Software distributing activities

Though software distribution is not an offence, but you need to have a valid license  to distribute the copies from the company or person who owns the rights of that particular software otherwise you will be violating the laws. Google himself does not breaks laws and expects the same from his members, so if you will indulge in such activities, your blog will always be in danger.
Music download will mostly be endangering activity because their licensing procedure is rather difficult and very costly as every owner will have rights of a limited number of songs or tunes and costs very high. Thus distribution of music with a valid license will cost the blogger many folds higher than the earnings and distributing without a valid license will be against Google’ terms.
Image curtsey-allthingslearning.files.wordpress.com

Spamming is not liked by Google. Blogs created or designed to drive traffic to a site or to increase its page rank in search engine indexing and scraping existing content from other sources for the primary purpose of generating revenue or personal gains are some of the examples of spamming.
Child Safety
Google has a zero tolerance policy towards child exploitation. Content  encouraging or promoting sexual attraction towards children are not allowed. Images of children where the images are sexually suggestive are forbidden.
Crude Content
Contents of the posts and graphics must not be just for shocking. Close-up of gunshot wounds, mass violence, deteriorated human bodies and grave accident scenes without additional context or  detailed commentary will be objectionable.
Creating Violence
Threatening others or any content to this effect on your blog is strictly prohibited. For example, Never post death threats against another people or group of people and encouraging or psychologically motivating your readers to take violent action against another person or group.
An article, post or content which encourages or supports Racialism is not allowed. 
Hate Speech
Google allows you to use Blogger liberally to express their opinions even very controversial ones. But publishing a hate speech is not allowed. Content promoting hate or violence towards groups based on race, ethnicity, religion, disability, gender, age, veteran status, or sexual orientation/gender identity are covered under this category, For example, a blog saying that members of a certain Race are criminals or a blog advocating violence against followers of a certain Religion is objectionable by Google.
Violation of copy Right
Infringement of copyright is viewed very seriously by Google. Providing links to sites on your blog where your readers can obtain unauthorized downloads of other people's content also an infringement of copyright.
Harassing Others

Using the Blogger platform to harass or bully others is a criminal offence. Google may remove or delete your blog and can ban you permanently. Online harassment is illegal at every places and can also result in serious offline consequences.

Malware and viruses

blogs transmitting viruses, causing pop-ups, attempting to install software without the reader's consent, or otherwise impacting readers with malicious code. are strictly forbidden on Blogger.

Publishing Personal and confidential information of others 

Never publish personal and confidential information of others like credit card numbers, Social Security numbers, unlisted phone numbers, and driver's license numbers etc.. For this purpose the information already available elsewhere on the Internet or in public records is not considered to be confidential  by Google.

Illegal activities

Use of Blogger to promote or engage in illegal and dangerous activities like  encouraging people to drink and drive, selling prohibited drugs and activities related to abuse of children are strictly prohibited. In addition to deleting your blog and banning you permanently, Google  may report the matter to the appropriate authorities.

Impersonating others

Please don't mislead or confuse readers by pretending to be someone else or pretending to represent an organization when you don't. Publishing parody or satire are allowed but these must not be to misguide readers

Secure your Phone Numbers-Save contacts in Gmail Account

Secure your Phone Numbers-Save contacts in Gmail Account 

How easy it is if some one store your Phone Numbers free of cost and give you a guarantee of their security. Yes Google will do it for you and free of cost. For it you need an account with Google i.e you need a gmail account. To store your mobile phone numbers first of all you will have to back up your  contacts. Most of the phones have the facility of taking backup of contacts. After taking the backup transfer the backup file to your computer. Gmail supports importing CSV files from Outlook, Outlook Express, Yahoo! Mail, Hotmail, Eudora, vCard from apps like Apple Address Book and some other apps. It is easy to create and edit CSV(Comma Separated Values) files,  in Spreadsheet programs like Google Spreadsheets and Microsoft Excel to import and export contacts. CSV file should be formatted as a table and must include a header, or first line, that defines the fields in your table. Gmail accepts many common header fields (name, email address, etc.). The CSV file may be in the following format –

The Google Nexus 5 smartphone Details and comparison with iPhone5

The Google Nexus 5 smartphone Details and comparison with iPhone5

The Google Nexus 5 smartphone running on the latest version of Google Android OS, is making its wayto the Indian Market. Out of the two models, 16GB and 32GB only 16GB smartphone will be available currently in India at a cost of Rs 29,999. This cost is slightly(Rs-1000.00) higher than what Google announced for the Indian market. The Smartphone is available at LG stores in two colours(Black colour and White colour). The 32GB model is expected to available either by the end November or early December

Dual Screen Smart Phone – Coming before Chrismas-First time in the world

Dual Screen Smart Phone – Coming before Chrismas-First time in the world

A Russian Company YotaDevice is launching a new Android  based Smartphone which is expected to be available in the market by the coming X-mas. This Phone will have screens in both sides and will be the first ever dual screen mobile in the world. The Phone named YotaPhone will have a 4.3-inch 720p LCD display on  front and a 4.3-inch E-Ink display on the back which will help battery saving. It is similar to the technology available in the Amazon Kindle.The  LCD will be used for most of the activities and the low-power E-Ink back screen may be used for viewing notifications, time etc. without draining the battery when the phone is lying idle on a desk.  Running on Android 4.2.2, the phone will enable users to access  all the usual range of apps and Google service. By placing your information on the back screen, the E-Ink display may be used for reading ebooks. In addition to the  dual-screen technology the the device will come with a dual-core 1.7Ghz processor, 2GB of RAM, 12MP primary camera, 1.3MP secondary camera, Bluetooth 4.0 and 32GB or 64GB of internal storage capacity.


Bots Back Doors Malware, Trojans, Spyware, Virus security threats

Bots Back Doors Malware, Trojans, Spyware, Virus security threats -What is a malware ? A large number of computer users know computer virus only but virus isalso a malware..All these are in fact a type of software  and called with different names like Viruses, worms, Trojans, spyware, backdoors and bots(or a common name for them all is “The Malware”) depending upon their actions. Specialists have put them in different categories. These are specifically designed to damage, disrupt, in general inflict some other bad or illegitimate action on data, hosts, or networks or steal some kind of information like identities or passwords. These are technically known as Malcode(Malicious code)Different types of malware have varying ways of infecting systems and methods of propagatingthemselves. They can infect systems by being bundled with other programs or attached as macrosto files. Some are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, finding a hole in the browser. Some times they only requires the users to simply visit a website to infect their computers but majority of these are installed by some action from the user, like clicking an attachment to an e-mail or come bundled  while downloading a file from the Internet.
Viruses, worms, Trojans, bots, back doors, spyware, and adware are some of the more commonly
known types of malware and . damage from malware varies from  minor irritation browser popup ,
to stealing confidential information or some times money too, destroying data, and compromising
and/or entirely disabling systems and networks

Hardware of systems and network equipment, cannot be damaged by the malware but data and
software residing on the equipment can be effectively damaged. Please do not get confused with  the defective software, which is intended for legitimate purposes but has errors or bugs.

Classification of Malcode

Viruses and worms are the most common types of malware. These programs may self-replicate and
can spread copies(Even auto modified Copies) of themselves. A malcode must have the capacity to
auto propagate to be classified as a virus,  worm, malware, bot or a Trojan. A  worm operates independently of other files, but a virus depends on a host program to spread itself. Main
classifications of malcode are given below –

What are Trojans

Trojans are a type of malcode, named after the atory of the wooden horse. Almost all of  you have read the story and if not read it here if you are interested. Trojan is a  very harmful malcode. It looks legitimate and users are tricked into loading and executing it on their computers. It can execute unlimited attacks on the host, after it is activated, it can irritate the user by popping up windows,  changing desktops, damaging the host by deleting files, stealing data, Identity passwords etc., spreading and activating other malcode.  Trojans are notorious to create backdoors giving malicious users  an access to the system, though Trojans do not reproduce by infecting other files they do not self-replicate.
Image Curtsey-http://www.nostarch.com

Trojans are considered to be the most harmful malcode.

What are Worms

Worms are similar to viruses. They replicate functional copies of themselves and are capable of
causing the same type of damage. Where viruses  require a host file to spread and worms are
standalone software and need not a host program or human help to propagate. Worms are spread,
either exploiting a vulnerability on the target or using some kind of social engineering to trick users. A worm always enters a computer system through a vulnerability in the system taking  advantage of transport features of a file or information on the system, allowing it to travel unaided.

What are Viruses

 A  malware that propagates himself by  inserting itself into and becoming part of another program and spreads from computer to computer leaving infections as it travels. Severity of viruses may range  from  mildly annoying effects to damaging data or software and even denial of service (DoS) conditions. Viruses are  mostly attached to an a  ..exe(executable) file. Virus  existing on a system may  not be active or  spread until a user runs the host file containing malicious software. When the host code is executed, the viral code executes simultaneously. Sometimes the infected program keep functioning but some viruses overwrite other programs which destroys the program totally. Viruses spread  computer to computer when the software they are attached to is transferred through network, a disk, file sharing, or infected e-mail attachments.

What is Spyware

Spyware is a general term used to describe software that performs certain behaviors, generally
without obtaining your consent such as, advertising, collecting personal information, changing the
configuration of your computer. The key in all cases is whether or not you understand what the
software will do and have agreed to install the software on your computer. Because almost these
softwares are installed with other software you agreed for. A common trick is to covertly install
the software during the installation of other software you want such as a music or video file
sharing program.

Spyware is often associated with adware i.e a software designed to display advertisements that also
tracks personal or sensitive information. That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you may pay for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Knowing what spyware does can be a very difficult process because most spyware is designed to be
difficult to remove. Other kinds of spyware make changes to your computer that can be annoying and
can cause your computer slow down or crash.

What are Back Doors

The scope of the term back door is vast. You can understand from the fact that it is used by the
security agencies of many countries to spy their rivals. No effective prevention is available yet. It is a means of access to a computer program bypassing its security mechanisms. Attackers use back doors to detect or install themselves, as part of an exploit. Some worm are designed to take advantage of a back door created by their earlier attack. A worm Nimda enters through a back door made by another worm Code Red. A back door is always a security risk, because crackers are always looking for any vulnerability to exploit. Understand from these examples –

(i)    A back door named time bomb could programmed by an using HDL language which automatically triggers backdoors after a pre fixed time(Like  30 Minutes after switching on) after the power-on of a device. The computer could be forced to crash or operate maliciously after a fixed time. It’s clear that this type of attack are always very dangerous. Designing a kill switch function is also
possible and this  could be totally undetectable by any validation methods.

(ii)    Backdoor triggers based on specific input data known as cheat codes, could be programmed by
an attacker. A cheat code is secret data used by the attacker to identify themselves to the hardware
backdoor logic, then initiate a malicious operation mode. As opposed to time bombs, this kind of
backdoor needs a second attack.

What are Bots

The name Bot is derived from the word Robot.and can be used good and malicious both purposes. It
automate tasks and provide information or services as a human being. Instant messaging(IM), web crawling, web interfaces and Internet relay chat(IRC) are typical use of bots to gather information. A malicious bot is self-propagating malware designed to infect a host and connect back to a central server of an entire network of compromised devices, or botnet. Broad-based, flood-type, remote-controlled,  attacks can be launched against their targets by an attacker. with a botnet. In additition to the self propagating worms ability of bots include, passwords gathering, log keystrokes, stealing financial information, capturing and analyzing packets, spam relaying, launching  Denial of Service(DoS) attacks, and opening back doors on an infected host. Bots are more versatile in their infection having all the capabilities of worms. Bots infect networks in a way that escapes immediate notice and rarely reveal their presence with high scanning rates, which damage network infrastructure



It is a command, a methodology or a piece of software, that attacks a particular security vulnerability
and are  a common component of malware.

Back Door

It is a way of accessing a system, bypassing the normal authentication mechanisms placed in a software by its programmer.

Safety Measures Against Bots, Backdoors, Virus, Trojans etc. Malcode

1.    Keep your Operating system(OS) always updated with most recent patches and fixes provided by
your OS designer(Like Microsoft for Windows)
2.    Have a good quality antivirus software installed on your system and keep the  viruses, worms,
Trojans, and bots definitions up to date.
3.    Make sure that your antivirus program scans all e-mails and files before they are downloaded.
4.    Install a fire wall.
5.    Never ignore or add exceptions to a site while you receive a warning while visiting it.
6.    Music or video file sharing program may infect your system.

Disclaimer - This document does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. You will use the information at your own risk. I reserves the right to change, modify or update this document at any time.

Delete Files forever, free space from your Computer Hard Drive ensure secure sensitive data

Delete Files forever, free space from your Computer Hard Drive ensure secure sensitive data

 Almost all of us we delete  out dated or the  files not required in future from our computer hard drive
to free disk space. To delete a file from our computer,  we generally right click the file icon, click
delete(Or press delete Key on the key board). Now we receive a confirmation message  “Are you sure you want to send (File name) to the Recycle Bin” , and by clicking  “Yes’ it moves to the Windows Recycle Bin. When you empty the Recycle Bin  the file is permanently erased from the hard drive. But the real story is different. Neither the disk space is freed nor the  file das been removed completely. The file appears to have been trashed but a skilled technician may have no trouble restoring that deleted file using data recovery software – some of which are freely available online. Here’s