Archive: TECHNOBYTES Subscribe to TECHNOBYTES

RegistryEditor

Technobyte : Registry Editor Shortcut

Did you wonder if you wished to have some shortcut to Registry Editor where you can directly navigate to the path entered ? Now its time to create yourself. Copy below code to a Notepad document and save it as registry.vbs Set WshShell = CreateObject(“WScript.Shell”) Dim...
Quicklaunch

How to get ShowDesktop Icon in Quick Launch

Hi Friends, Generally many times we are used to Show Desktop in quick launch(next to Start Button) to minimize all the windows. (Keyboard shortcut Ctrl+D also minimizes all the open items in your system). But sometimes, we might face problems...
1_network-security-auditing

TechnoBytes-14

Professional Anti Virus softwares work efficiently to protect our PC from Virus & Spywares than Free Versions Batch Files can be displayed using Echo command. To access desktop folder, Goto Run and Type .   (dot only) Win key on...
net

TechnoBytes-13

Do not make any changes to CPU Clock Speed,RAM Clock in BIOS without proper knowledge. Use Schedule Agent program to schedule tasks in our computer. Magic ISO program can be used to open BIN,IMG,CIF,NRG,BWI,ISO and other CD images To...
Internet

TechnoBytes-12

User details in the network gets logged at Windows\WindowsNT\System32\Config If desktop.scf file is removed  from  Windows OS, then Show Desktop in Quick Launch will be removed. Safe Mode Boot can be enabled by making changes to boot.ini...
Boot Sector

TechnoBytes-11

<image credit> Boot Sector Virus can be deleted only by means of Rescue Disks or DOS version Antivirus programs. Virus can spread easily using LimeWire. Hackers use Open Ports to enter into our System. Last Acccess Stamp file information...
Network

TechnoBytes-10

<image credit> Browser cookies can sometimes be harmful. Reverse Engineering is the process of Deassembling and changing the code. Most of the cracks & keygens available on NET contain Spywares & Virus programs. Phishing...
Security

TechnoBytes-9

<image credit> Install Active X components only after reading the Security Message. Files downloaded from File Sharing Networks should be scanned always. Encrypting the sending information can be helpful to get protection from...
3_network-security-scan

TechnoBytes-8

<image credit> Maximum number of Virus & Trojan programs are hidden behind svchost.exe system process. Enabling Auto Fill option in Messengers can be used to block information being tracked by KeyLoggers. Dailer programs can...
Jolicloud

TechnoBytes-7

Jolicloud1.0, a free HTML5 based web-centric Linux OS,releases to public. You can block anyone on Facebook expcept founder and CEO Mark Zuckerberg. PS3 hack allows users to install Linux distributions on it. A malware named Spy rootkit...
Loading...