Posts

What is Encryption and decryption ?

" Encryption is a technique or method used in order to convert a message or plain text into an unreadable format usually know as cypher , so that unauthorized person can not read that message except an authorized party. On the contrary decoding of cypher into plain text is know as decryption." Encryption is a powerful method usually used to encode your messages also called plain text into an unreadable format also known as cypher text, so that your message secrecy remain constant. Encryption is in existence before a long time and being used to encode messages so that enemies or an intruder can not change or read that message. From the beginning many methods has been introduced like Cesar shift cipher technique, however other techniques with more reliability has also been introduced. Encryption is used by websites while you're doing online banking and shopping. It is also used to encrypt your emails and messages on social networking site...

Activate or Disable Admin account from Command Prompt

Sometimes administrator account are disabled by the companies and colleges to prevent unauthorized access in the computer. Usually it is protected by some password credential. If it is not password protected then you can easily activate it and use it. But you must have admin privileges to open command prompt as an administrator. Administrator account is very helpful to keep an eye on the other accounts in your computer. You can apply any kind of security on the other accounts to limit the access on the computer or on the internet. If you have administrator account in your possession then you have the entire leverage to do what do you want to do e.g downloading, net surfing, user's account management and so on. If your account has some admin privileges to open command prompt as an administrator then you can easily activate or deactivate admin account. Sometimes you have an Admin account but there wil...

How to change Admin or other account Password from Command Prompt ?

If you want to change your account password then you need to go to control panel and then User Account and finally select change password for this account . It will ask you to type your new password twice. It is very exhausted task. If you don't want to pass through this entire process you can do this very easily by Command Prompt. With the help of a Command Prompt you can change any account password but you must have Administrator privileges. If you have administrator privileges in your account then you have the entire leverage to change any account password within two Commands. People ask many times How to change Admin or other account Password from Command Prompt ? believe me it is very easy and tricky. So to change Admin or other account Password from Command Prompt you need to follow these steps. Step 1. Open Command prompt as an Administrator or go to start and t...

How to recover hidden pen drive data using command prompt?

Today lots of Computer users are in trouble because of their pen drive or USB flash drives. A common problem caused by a virus named shortcut virus, which converts all your data files inside your pen drive or USB flash drive into shortcuts and hide your actual data which may be very useful to you. You become a victim when you insert or plug in your pen drive or USB flash drive into someone's computer who has shortcut virus in his Computer. It effects your pen drive or USB flash drive as you insert your pen drive or USB flash drive into the computer which is suffering from shortcut virus. Most of the people format their pen drive or USB flash drive when encounter this kind of problem . This is not the proper solution . So now you will learn How to recover hidden pen drive data from Command Prompt ? To recover hidden pen drive data from Command Prompt you need to follow these two s...

How to remove write protection from USB flash drives using cmd ?

Write protection is a feature of a pen drive which saves you from malwares , however it becomes a disaster sometimes while you don't know that how to remove write protection from your USB drive or from micro SD cards . Your pen drive or USB flash drive might become write protected because of several reasons like by changing its attributes from command prompt in an efficient way or through viruses and so forth. So follow the given steps to remove write protection from your USB drive or from memory card . STEP 1: Open command prompt or press windows logo + R keys simultaneously, and then type in run prompt cmd and then press enter, it will pop up cmd. STEP 2: Now in command prompt type your USB drive letter like M: in my case, write your USB letter instead, and press Enter. Type this command attributes clear readonly and press Enter. It will give you a message that operation performed successfully. Now you are good to go, write protection has be...

What is virtual memory ?

Virtual memory is a kind of memory which is created by our operating system on a small portion of our system's hard disk according to our RAM size, in order to handle or manage more address space if RAM is not capable to hold overall address space. A common mistake done by people to consider virtual memory that virtual memory holds data but believe me nothing like that. Virtual memory only holds data address instead, i.e. called address space and your RAM also holds address space not data. When your RAM is no more capable of holding address space it transfers the rest of the address space on virtual memory , which is reserved memory space on your system's hard disk to achieve this task. You can also manage (increase or decrease) your system's virtual memory. To increase virtual memory read my PC tune up post . One important thing to let you know that people always says if you increase your virtual memory then you need not m...

What are hash functions and message digests ?

" Hash functions and message digests are a way to maintain data or message Integrity, to ensure that data is not tempered or change by any means like deliberately or accidentally. Basically they include a string of digits, which is also called checksum. " Hash functions and message digest are an efficient way to manage the Integrity of data or a piece of message. They usually generates an string value i.e. called hash value or checksum. Message digest also notify to the owner when data or message is tempered or changed, and also locate the intruder and generated copies of data. There are various hash functions used to generate hash values or checksum like MD5, SHA1, SHA2, SHA3 and CRC32. MD5 and SHA1 functions are not more reliable, therefore SHA2 and SHA3 are in use nowadays. So we have learned now, What are hash functions and message digests ? And why are they used, keep learning from computerflicks. Please leave c...