How to Hide Files in Windows

Note: this will not keep fbi/police/anyone who knows computers really good from finding your files, only computer illiterate people and people who aren’t really looking for incriminating files on your computer. Hiding…

MS DOS COMMAND LIST TUTORIAL

A lits of Ms-Dos commands and their usage Attrib Sets the attributes of a file attrib +H -R +S -A new.txt -Sets new.txt to be hidden and a system file, but not read…

Morris Worm Source Code and History

Morris worm was created by a student from cornell university named Robert Tappan Morris. It was created on November 2, 1988. According to creator this worm was not created to…

How to Design a Computer Game

Are you tired of spending money on the latest games only to find out they are too easy or boring? Are you seeing the same game launched over and over…

How to Secure Your Cloud Account

Development of the Internet contributed to creating a huge virtual world where the security of digital identity is not very stable. Storing data in the cloud brought about a major security issue not only for companies…

Different Ways of Computer Troubleshooting

Being patient is crucial when computer troubleshooting issues starts creeping in the system. Getting frustrated or not taking notes can prolong the process of troubleshooting considerably. While starting, be careful…

How To Boost BSNL Broadband Speed

BSNL broadband is the best Internet Service Provider in India. BSNL gives good internet connection speed at a low price. BSNL gives very good downloading and uploading speed at a low price. Most of the internet users…

Fix All Structured Data Errors

It’s time to fix some common errors in your blog. In this blog post we are going to discus common structured data errors. You can use Google webmaster tools to detect them. Google already…

Passwords

This is pretty simple.  Change your passwords and change ‘em often. An easy way for you to protect your sensitive data and email is to change your passwords on a…

SpyWare / Pests

One thing to remember about controlling pests, spyware and malware is. . .  there is safety in numbers.  Just as three musketeers are stronger than one, three spyware programs are…