Friday 26 April 2013

Nayo Lagda Full Song Lyrics - San2 Singh and Full Official Video


Album Name : Nayo Lagda
Album Artists : San2 Singh




Nayo Lagda song Lyrics

Aa Vey Mere Kol tu adiye 
Koi Gharo Baahana La ke
Rajj Rajj Karah Pyaar Ni Jaane 
Tennu kol Appne Bitha Ke 
Nayo Lagda Dil Tere Baajo Sohniye
Nayo Lagda Dil Tere Baajo Sohniye 
Yaad Teri Har velhey Aawe Mainu Sohniye 
Nayo Lagda Dil Tere Baajo Sohniye
Yaad Teri Har Velhey Aawe Mainu Sohniye 
Nayo Lagda Dil...

Baadiya Umeeda Tere Aoun Diyan Rakhiya 
Tere Rahaan Vich Visaahiyan Asi Akhiyan


Baadiya Umeeda Tere Aoun Diyan Rakhiya 
Tere Rahaan Vich Visaahiyan Asi Akhiyan

Dina Wange Naang Je Nah Joben Di Rutt Ni 
Dina Wange Naang Je Nah Joben Di Rutt Ni
Geet Koi Mohabbatan Da Gahja Kitte Soniye 
Nayo Lagda Dil Tere Baajo Sohniye 
Yaad Teri Har V

elhey Aawe Mainu Sohniye 
Nayo Lagda Dil

Tuhio Meri Jind Te Tuhio Meri Jaan Eaa
Hassya Dey Vich Kad Layi Tu Meri Jaan Eaa
Aaaaaa Aaaaa 


Tuhio Meri Jind Te Tuhio Meri Jaan Eaa
Hassya Dey Vich Kad Layi Tu Meri Jaan Eaa

Hooo Rounk Wadda Dey Sade Ghar Di Tu Aaa Ke
Rounk Wadda Dey Sade Ghar Di Tu Aaa Ke
Vehdey Ch Panjeba Chanka Ja Kitte Soniye
Nayo Lagda Dil Tere Baajo Sohniye 
Yaad Teri Har Velhey Aawe Mainu Sohniye 
Nayo Lagda Dil

Marke Udaari Ajja San2 De Kol Ni 
chad Sarmona Keh De Pyaar Walle Bol Ni


Marke Udaari Ajja San2 De Kol Ni 
chad Sarmona Keh De Pyaar Walle Bol Ni

Sachiya Mahobattan Da Karke Kirrar Ni 
Hoo Sachiya Mahobattan Da Karke Kirrar Ni 
Didar Naal Jind Likwa Ja Kitte Soniye 
Nayo Lagda Dil Tere Baajo Sohniye 
Nayo Lagda Dil Tere Baajo Sohniye
Yaad Teri Har Velhey Aawe Mainu Sohniye 
Nayo Lagda Dil Tere Baajo Sohniye
Nayo Lagda Dil Tere Baajo Sohniye
Nayo Lagda Dil Tere Baajo Sohniye...........


Read More...

Thursday 25 April 2013

Meh Punjabi Boli Ah Full Song Lyrics and Official Video-Jaz Dhami


Song :- Meh Punjabi Boli Ah
Singer :- Jaz Dhami




Meh Punjabi Boli Ah Lyrics

Raaj badle taa kai taaj badle
Badlaiyan reetan te tera waaj badle

Raaj badle taa kai taaj badle
Badlaiyan reetan te tera waaj badle 
Main hun tak badli naa
Hun tak badli naa
Main hun tak badli naa paave bhulli jaaye zamana
Meh Punjabi boli ah
Meh teri boli ah... kitte bhul na jaayin jawana
Meh teri boli ah...
Meh teri boli ah...
Meh Punjabi boli ah.. kitte bhul na jaayi jawana

Ik waqt c aisa aave je meri duniya vich c chandi
Main vich shatta te reh gayin
Do siyaa vich bandi

Ek bholi honi da
Mainu bholi honi da lagiyaa taada eh harjaana

Meh teri boli ah... Meh teri boli ah...
Meh Punjabi boli ah.. kitte bhul na jaayi jawana

Jeonde jee mar gayi main meri peeth te chhori chalayi
Shad oorh airh nu A B C par dhyaan banaai

Kun khatra jamke amdi nu
Kyun bakadra bhulli jaane
Meh teri boli ah... Meh teri boli ah...
Meh Punjabi boli ah.. kitte bhul na jaayi jawana

Kashmir tu yaad rakhi
Ek din mud ke aisa aauna
Mera pehla wangra ve parcham duniya te lahrouna
Shiv-Patra wargiyan da, thandiya bukal vich khajana

Meh teri boli ah... Meh teri boli ah...
Meh Punjabi boli ah.. kitte bhul na jaayi jawana


Read More...

Yahoo's Latest Summly App For iPhones


Yahoo released an iPhone app that weaves in story summarizing software bought from a London schoolboy last month for a total reported to be around $30 million (20 million). 

The Yahoo app that was made available in the United States for use upon iPhones and iPod touch devices uses natural-language algorithms and machine learning from freshly-acquired Summly "to deliver fast story summaries." 



"We acquired Summly less than a month ago, and we're thrilled to introduce this game-changing technology in our first mobile application," Yahoo! chief executive Marissa Mayer said in a release. 

California-based Yahoo announced in March that it bought the Summly app created by 17-year-old Nick D'Aloisio of Britain but did not disclose the buy price. 

D'Aloisio dreamed up Summly while preparing for a history test when he was 15. 

His enormous breakthrough came in 2011 when D'Aloisio launched Summly's forerunner Trimit, which cut down long web articles to tweet-length summaries. 

The app received determined reviews from tech blogs; racked up tens of thousands of downloads, and caught the attention of investors. 

D'Aloisio took up a job in Yahoo's London office. 

"I'll be integrating the Summly technology into different areas we feel are appropriate for Yahoo, and more broadly helping them with their mobile product design," he told AFP in an interview last month. 

"The new Yahoo app has both good technology and beautiful design front and center," Mayer said. "We've also improved the search experience with better video and image search."
Read More...

Monday 22 April 2013

Tere Bina Din Mere Full Song Lyrics-Rangeelay


Song : Tere Bina Din Mere
Movie : Rangeelay
Stars : Jimmy Sheirgill, Neha Dhupia
Singer : Feroz Khan
Lyrics : Kumaar




Tere Bina Din Mere Song Lyrics

Tere bina din mere saah nayoon laindee, raat tadakti nai
Ho Tere bina din mere saah nayoon laindee, raat tadakti nai
Naina de jameen uthe neend vi meriii, pair huuund rakhdi nai
Tu kal ditta ni mera lag da na ji aaj dil naiyo uthe mera kal jithe si..

Tere bina din mere saah nayoon laindee, raat tadakti naii

Tenu ki pata ki hoond laga hai menu ta jaga k dil soon lga hai
Tu jo mili khushi vich chala hoo gyaa duur je gal to vekh ron lgaa hai..
Tu kat ditta ni mera lag da na ji aaj dil naiyo uthe mera kal jithe si..

Tere bina din mere saah nayoon laindee, raat tadakti naii
Raat tadakti nai...


Read More...

Kach Da Samaan Full Song Lyrics-Lucky Di Unlucky Story-Official Video


Song :- Kach Da Samaan
Music :- Jatinder Shah
Lyrics :- Veet Baljeet
Album :- Lucky Di Unlucky Story




Kach Da Samaan Lyrics

Ho Kach Da Samaan Sama Risky 
Utto Saali Boor Ji Pavve 
Ho Nachdi De Pair Jaande Tilki 
Fadho Fadho Digg Nah Pavve
Fadho Fadho Digg Nah Pavve..
  
Ho Kach Da Samaan Sama Risky 
Utto Saali Boor Ji Pavve 
Ho Nachdi De Pair Jaande Tilki 
Fadho Fadho Digg Nah Pavve

Khake Walla Vich Phull Tey Clip Kudi De 
O mundya De Chakki Jaande jack Kudi De

Khake Walla Vich Phull Tey Clip Kudi De 
O mundya De Chakki Jaande jack Kudi De
Ho Sat Rangi Chunni Rang Milky 
Morran Da Bhulekha ja Pavve..

Ho Chak Lavvo KHiller Gayian Jhanjhra.. 
Nalle Saddiya Khiller Gayian Andraan.. 

Ho Chak Lavvo KHiller Gayian Jhanjhra.. 
Nalle Saddiya Khiller Gayian Andraan..
Meri Esey Gallo Akh Nayio Laggdi 
Ho Kayian De Ne Gaye Kam Chaadi 
Kach Da Samaan Sama Risky 
Utto Saali Boor Ji Pavve 
Ho Nachdi De Pair Jaande Tilki 
Fadho Fadho Digg Nah Pavve


Read More...

Adhi Adhi Raat Full Song Lyrics-Bilal Saeed-Twelve


Song :- Adhi Adhi Raat
Singer :- Bilal Saeed
ALbum :- Twelve
Music :- Bilal Saeed




Adhi Adhi Raat Lyrics

Adhi Adhi Raat Meri Aakh Khul Jaawe
Yaar Teri Seene Vich Khich Jehi Paawe
Dus Fhir Meinu Hun Neend Kive Aiwen..sohniye
Leke Tere Naam Dil Aarzan Guzaare
Aakhiyan De Athru V Sukk Gaye Ne Saare
Teinu Bhull Jaan Wale Disde Naa Chaare..sohniye

Nee Dus Ki Kasoor Metho Hoya
Tu Aakhiyan Toh Door Mehto Hoya
Nee Dil Majboor Kiyu Hoya
Ikk Waari Dus De Zara
Dil Waale Puch De Ne Chaa
Ikk Waari Dus De Zara
Dil Waale Puch De Ne Chaa
Ooo.ohh..ooooo

Tarle Kara Zidd Te Aada
Mannda Hee Nahi Dill Ki Kara
Har Waar Ae Dhadke Jado
Lainda Rave Ikk Tera Naa
Dil Meri Mannda Hee Na
Takkda Fhire Teri Raah
Ikk Waari Dus De Zara
Dil Waale Puch De Ne Chaa


Nee Dus Ki Kasoor Metho Hoya
Tu Aakhiyan Toh Door Mehto Hoya
Nee Dil Majboor Kiyu Hoya
Ikk Waari Dus De Zaraa
Dil Waale Puch De Ne Chaa
Ikk Waari Dus De Zaraa
Dil Waale Puch De Ne Chaa

Read More...

Saturday 20 April 2013

KALQ-Latest Keyboard Increase Speed of Typing Easier and Faster on Smartphones


Smartphones have arrive as a blessing but there are yet a few who pick the age old touch-and-type phones. Whats the main reason behind the preference? The presence of hardware buttons.

While smartphones, with their plethora of apps have made life easy, some people locate it increasingly hard to tackle the touch-screens. There's no satisfaction of the click (not the sound but the feel). Also, while the difficult keyboards enabled typing without looking at the screen, it is quite a difficult art to master in touch-screen phones.




However, looks like the challenge of typing on a touch-screen phone will acquire much easier. Researches allegation to have created a new keyboard for touch-screen devices that enables super-quick typing. The keyboard is not the traditional QWERTY board but instead supports a different format. Researchers are confident that the new keyboard improves the speed of typing by up to 34 percent!

Researchers from the Max Planck Institute for Informatics and colleagues from the University of St Andrews and Montana Tech have devised a new technique for making two-thumb typing easier and minimizing the stress upon thumbs. The new design changes the placement of alphabets and characters too.

According to the new layout, the alphabets that are used more often are clubbed together. The keyboard will attempt and promote typing with a single thumb. According to researchers, Experienced typists move their thumbs simultaneously: While one is typing, the other is approaching its next target. We derived a predictive model of this behavior for the optimization method.



The new keyboard will be called KALQ and in the keyboard every vowels expect for the letter y will be placed to the right, assigned for the right thumb. Other alphabet keys along with numeric and special characters keys will be to the left.

Also, with devices getting bigger, the current keyboard is getting more restrictive. The QWERTY keyboard requires typing with both thumbs and fingers of both hands. This makes it increasing hard to keep a tablet in one hand and type with the other. Also, typing upon a touch-screen device with a thumb is completely different from typing upon your computer/laptop keyboard.



According to research, it has been established that usual users using a QWERTY upon a touchscreen device are limited to typing at a rate of around 20 words per minute, which is slow compared to the rates achieved upon physical keyboards.

The KALQ app is expected to increase the typing speed on touch-screen devices from the gift 20 words per minute to 37 words per minute! Which is almost double! The app will initially be an Android app and is expected to roll out by the first week of May.
Read More...

How To Create Or Remove User Account In Windows XP, Vista and Window 7

How To Create Or Remove User Account In Windows XP, Vista and Window 7

The process will describe how to add or remove user account in Windows XP, Vista and Window 7. The adding of more account will help people to make their data safe when the PC has multiple user.


How to Add a User Account

  1. Open Control Panel (Change the view to ‘Category’).

  2. Go to ‘User Account and Family safety’ then ‘User Accounts’ then ‘Manage Another Account’.

  3. Now new window will open on your screen, it shows the number of users available in the Window.

  4. Now click on ‘Create a New Account’.

  5. It will ask for the ‘user name’ of the new account and the type of the user Account ex. Standard user or Adminadtrator.

  6. Click on Create Account.

That’s it, the new Account will be created.

How to remove a user account

  1. Open Control Panel (Change the view to ‘Category’).

  2. Go to ‘User Account and Family safety’ then ‘User Accounts’ then ‘Manage Another Account’.

  3. Now new window will open on your screen, it shows the number of users available in the Window.

  4. Choose the user Account that you want to delete.

Note : The account you want to delete must not be an administrator account and you can not delete an logged Account.

  1. Now choose ‘Delete the Account’.

  2. Now it will ask for whether you want to keep or not the user files, Choose the option that you want to desire.

  3. Now choose delete Account.

  4. Click on ‘OK’.

That’s it, The account will be deleted.

Read More...

Tuesday 16 April 2013

How To Show Or Hide The Windows Version On Desktop Of Windows XP, Vista and Windows 7

How  To Show Or Hide The Windows Version On Desktop Of Windows XP, Vista and Windows 7

This will enable or disable the showing of windows version at the bottom of right side corner just above the taskbar. Windows version will describe the which version of ‘Operating System’ you are currently using.



To Show The Windows Version On Desktop just follow these steps:

Step 1. Open registry editor (Type “regedit” without quotes on start search box in RUN window and enter).

Step 2. Now navigate to

HKEY_CURRENT_USER\Control Panel\Desktop

Step 3. On the right side, locate “PaintDesktopVersion”.

Step 4. Right click of mouse there and select modify.

Step 5. Now change the value in value data field on the top pop up window to ‘1’.

Step 6. Now click ‘OK’.

Step 7. Now close the registry editor and all the other open window and restart your system.

That’s it after restart you will find the windows version on your desktop.

To Hide The Windows Version On Desktop just follow these steps:

Step 1. Open registry editor (Type “regedit” without quotes on start search box in RUN window and enter).

Step 2. Now navigate to

HKEY_CURRENT_USER\Control Panel\Desktop

Step 3. On the right side, locate “PaintDesktopVersion”.

Step 4. Right click of mouse there and select modify.

Step 5. Now change the value in value data field on the top pop up window to ‘0’.

Step 6. Now click ‘OK’.

Step 7. Now close the registry editor and all the other open window and restart your system.

That’s it after restart you will find the windows version will hide on your desktop again.

Read More...

How To Change Window XP Start Button Name

How To Change Window XP Start Button Name

I’ve read a number of articles on the internet about changing the text on the Start button in Window XP. On more than one occasion I’ve seen references to a five letter limitation when the button is renamed. I always wondered if this was true or just an assumption someone made because the default “Start” just happened to fit the button size. So, I decided to run a test and see if there really was a five character limit.



First of all just u need to do is download Resource Hacker.

Resource Hacker TM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000,and WinXP operating systems. Its just 541kb in the size.. go to and download from Google.

Steps To Change Window XP Start Button Name :

Step 1. The first step is to make a backup copy of the file explorer .exe located at C:\Windows\explorer . Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer .exe located at C:\Windows\explorer .exe. The category we are going to be using is String Table in Resource Hacker. Expend it by clicking the plus sign then navigate down to and expend string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “Start” just as it displays on the current Start button. There is no magic here. Just double click on the word “Start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry.

Step 2. Modify the Registry now that modified explorer .exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, Go to Start (soon to be something else) Run and type regedit in the open : field. Navigate to :

KHEY_LOCAL_MACHINE\SOFTWARE\ MICROSOFT\ Window NT\ CurrentVersion\ Winlogon

The right pane, double click the shell entry to open the Edit String dialog box. In Value data : line, enter the name that was to save the modified explorer .exe file. Click Ok.

That’s it, close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text .

Read More...

Monday 15 April 2013

Trick To Use PC Without Mouse

Trick To Use PC Without Mouse

To work with your computer without mouse for instance so set up you Windows to use your keybord instead of the mouse with its Mousekeys. You can use this trick in many cases like having a mouse problem and taking time to replace it, or not affording a new one or just getting it out to be cleaned.

For Windows XP User :

  1. Go to Start then Control panel

  2. Click on Switch to classic view from left.

  3. Double click on Accessibility options.

  4. On the new window, click on Mouse tab and check the option “Use Mouse Keys”

  5. Click on OK.

On the keyboard press the Num Lock key, it will make a beep sound.

For Windows Vista/Windows 7 Users :

The accessibility option has been changed to ease of access centre in Window Vista and Windows 7. So we need to make changes in ease of access centre. Do the following:

  1. Click on Start and type “Ease of Access centre” in the search box.

  2. Hit Enter to open Ease of Access centre.

  3. Click on Make the keyboard easier to use.

  4. Check the option “Turn on Mouse keys”, for changing settings click on Setup mouse keys.

  5. Click on OK.

That’s it, now you can use your keyboard as a mouse.

Here is the list of keys that you will use from you keyboard to navigate your cursor after you have enable the Mousekeys option :

2 - Move Down

8 – Move Up

4 – Move Left

6 – Move Right

7 – Move Diagonally Top Left

9 – Move Diagonally Top Right

5 – For click

Read More...

How To Speedup Window 7 By Using ReadyBoost Feature

How To Speedup Window 7 By Using ReadyBoost Feature

Window 7, the most popular OS in the world. Even Window XP and Window Vista are also available in market but the users of Window 7 are not reduced. Many Desktop users use Window 7. We all know that Window 7 has some very nice features to speed up its performance. One of its great features is “Ready boost”.  You can utilize free space of Pendrive to boost system performance using this nice feature.


Here I am providing simple steps that how to use Ready boost feature to speedup Windows 7 :

Step 1. First of all just plug your flash drive into USB post of system.

Step 2. After 4-5 seconds window 7 will show Autoplay dialog box. Then click on Ready boost option.

Step 3. It will show you the drive’s properties in dialog box, on the ReadyBoost tab.

Step 4. Choose the Use This Device option and adjust the slider to reserve the indicated amount of space for ReadyBoost.

Step 5. Now, Click OK.

That’s it, it will optimized the performance of your Window 7.

Read More...

Why Linux Need Malware Protection?-How To Protect your Linux

Why Linux Need Malware Protection?

“This is very embarrassing.” So began a post by the developers of unreal IRCd server after finding that software was infected with a Trojan. Another example of why enterprises should consider the safe haven of Linux? Just the opposite : The Trojan infected only the Linux version of the server software, but its Windows counterpart was clean.

Although Linux malware is relatively rare compared to attacks on Windows, it exists, and it’s steadily increasing. In fact, as far back as 2005, the amount of known Linux malware had already doubled over the course of a year to 863 programs. As Linux’s popularity grows among consumers and enterprises, so does its attractiveness to hackers.

In the process, the strategy of security by obscurity becomes less viable. So far, Linux server appear to be targeted more frequently than Linux PC’s partly because there’s a larger installed base. The risks are not limited to servers and desktops, either. One recent example is Backdoor. Linux.Foncy.a “the most striking example of a malicious program used by cybercriminals to remotely control an infected device by sending a variety of commands.”


In a sense, Linux malware today is like mobile malware circa 2002 : Many businesses, consumers and analysts scoffed at warnings simply because attacks were so few and far between. But as the attacks mount, so does the need for  a strategy that’s more robust than simply betting that the odds are in your favor.

Developing a Security Strategy

The good news is that many successful strategies from the Windows world are applicable to Linux.

  • Think twice about downloading free software and content even when it, the source or both appear innocuous. Ignoring that advice has facilitated hacks such as screensavers that use Ubuntu PCs for distributed denial-of-service attacks.

Backdoor.Linux.Foncy.a passed itself off as the “Madden NFL 12” game.

  • Run a Windows antivirus program. BecauseLinux PCs are still a minority, there’s a good chance that a file is headed for a Windows machine. Windows antivirus software minimizes the chance that the Linux PC or server will facilitate malware’s spread.

  • Borrow from  Ronald Reagan : Trust, but verify. For example, many Linux users trust Ubuntu’s Personal Package Archives. The potential catch is that although there’s a code of conduct, there’s no guarantee that a secretly malicious signatory won’t leverage that trust. Verification could include using only entities that have proven themselves to be trustworthily, or inspecting the files in a package for anything suspicious before installation.

There’s also a growing selection of books and Web tutorials for developing an enterprise Linux security strategy. For ex, CuberCiti.biz advises : “Most Linux distort began enabling IPv6 protocol by default. Crackers can send bad traffic via IPv6 as most admins are not monitoring it. Unless network configuration requires it, disable IPv6 or configure Linux IPv6 firewall.”

  • Explore vendors offering Linux security services and products. There’s a good reason why they’re worth paying attention to :

They wouldn’t have those lines of business if there weren’t enough threats already out there.

  • Don’t let managers and other supervisors blindly sign off on the wireless portion of expanse reports. This advice is low-tech as it gets, but it’s also highly effective- not just for Android malware, but types that target all other mobiles OS’s, too. Although a lot of malware is designed to harvest credit card numbers and other personal information, Backboor.Linux.Foncy.a is an example of the types that send messages to premium-rate text message and other data services. By  simply questioning why an expanse report has an unusually high wireless bill that month, you could catch an infected smartphone before it has several months or more to incur unnecessary charges. In the case of Backdoor.Linux.Foncy.a, only about 2,000 Android phones were infected, but that was enough for the hackers- later arrested- to run up an estimated 100,000 Euros in unauthorized charges.

Read More...

The Best Encrypted Flash Drive and List Of Top Five Flash Drives

The Best Encrypted Flash Drive

If you’re physical transporting data you don’t  want other people to see you should be doing it on secure media. And what better than something that hides easily within a pocket ? Secure flash drives that are only about the size of a small cigarette lighter feature robust hardware security to make them super secure. You’ll pay a premium for the integrated security, but you can’t put a price on the peace of mind you get by knowing that your data is locked down.

To get the skinny on the state-of-the art in secure flash drives, we took five hardware-encrypted drives for test spins. The results? As far as security is concerned, it’s  all system go. Three of the units-the Kingston Data Traveler 4000 Managed, the Kanguru Defender 2000, and the CMS CE-Secure Vault FIPS- are certified to Level 2 of the government’s FIPS 140-2 security standard. The Imation Defender F200 ratchets that up to Level 3. The Apricorn Aegis Secure Key is being processed for Level 3 certification, though it is not yet certified.

Those last two drives add a bit of panache and intrigue to what otherwise appear outwardly to be garden-variety flash drives. Imation’s Defender F200 has an integrated fingerprint scanner, while Apricorn’s Aegis Secure key has a PIN-entry keypad.

The Defender F200 and the Aegis Secure Key share an advantage beyond  their hint of spy drama-they’re operating-system and device agnostic. The other three drives in out roundup use client software interfaces to manage access to their data. This limits their use to Windows, OS X, and, in the case of the Kanguru Defender 2000, Linux. After you unlock the Defender F200 just as you would a normal USB flash drive. That means TVs, digital media adapters, printers, tables, and laptops are all fair game.


Not in the Fast Lane

Unfortunately, current secure flash drive performance doesn’t , match security, largely because they’re mired in the USB 2.0 past. In fact, none of the manufacturers reviewed here expect to release a USB 3.0 model until at least late this year. The fastest drive in this roundup tested nearly four times slower than two nonsecure USB 3.0 flash drives we included for comparison, Performance isn’t the main reason you buy a secure flash drive, but you might to stick with cheaper, smaller-capacity models until the faster technology shows up. (And pray you never have to get out of Dodge in a hurry.)

The Secure Advantage

All the drives in this roundup use the 256-bit AES hardware encryption required to achieve FIPS 140-2 Level 2 certification. Though you can certainly secure your data with a normal USB flash drive and encryption software such as the free TrueCrypt or EncryptStick, a chip is harder to hack, and to reach it means actually tampering with the drive, which is easy to detect.

FIPS 140-2 (Federal Information Processing Standard, Publication 140-2), referred to above, is the government’s take on methods for securing data. It’s not a technology, but rather a definition of what security mechanisms should do. There are four FIPS 140-2 levels. Level 1 involves using an approved encryption algorithm (such as AES 256). With  Level 2, the encryption is supplemented by a means to reveal tampering, level 3 adds protection for the encrypting mechanisms and algorithms tampering. Level 3 adds protection for the encrypting mechanisms and algorithms themselves, And with Level 4, you add physically daunting packaging and fry the data and decrypting mechanisms if a breach occurs.

Manageability

On the software front, an increasingly common theme for secure flash drives if manageability, Most useful with fleets of drives, manageability means that the drive’s status and security characteristics may be modified by an administrator-locally, or remotely across a network or the Web. Using a server console such as BlockMaster’s SafeConsole or Imation’s ACCESS Server, your friendly IT guys-in=back can set password strength, force password changes, track logins, and the like. They can even set drives so that data partition is hidden unless the unit is in contact with a server. No less than four of the drives in our roundup are manageable in this sense : the Defender 2000. The Defender F200, the latter is managed only (and available in an unmanaged version, too), while the previous three may be also be used unmanaged.

The Imation Defender F200 took top honors with its combination of biometrics, FIPS 140-2 Level 3 certification, and hint of elan, but it’s a mediocre performer. Kanguru’s Defender 2000 offer top-notch security and speed in spades ( for a USB 2.0 drive), though the software the software is a bit immature. The CMS CE-Secure Vault FIPS and the Kingston Data Traveler are  also good USB 2.0 performers, are FIPS 140-2 Level 2-certified, and have good software. The super-convenient Apricon Aegis Secure Key would have scored higher if it had not lost points for both its slow performance and its current lack of FIPS 140-2 certification.

Below is our comparison chart of the five secure flash drives covered in this roundup.

Read More...

How to Create or Crack Password on a RAR File

How to Create or Crack Password on a RAR File

This Process will help’s you to create a password protected file or folder using an application named “WinRAR”. WinRAR is a helpful tool allows you to create and handle archive files. It completely supports rar and zip. It is also able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives. It consistently makes smaller archives than the competition, saving disk space and transmission costs. In our daily work, create password protected RAR archives to against WinRAR files from others viewing is in great request.


To Create Password on a RAR file using Winrar

just follow these simple steps :-

Step 1. Choose the file or folder that you want to make password protected.

Step 2. Right click on it and choose “Add to Archieve” from the Winrar commands.

Step 3. Now, navigate to “Advanced” tab.

Step 4. Choose “Set Password”, and give password to the RAR file.

Step 5. Check the Option “Encrypt file names”.

Step 6. Now, click on “OK” and save all the changes.

That’s it, a new RAR file will be created with the same name of the file or folder which is password protected.

How To Crack Password on a RAR file

Sometimes you download a movie or something else by rapidshare or torrent and try to open it. Then a message comes on your desktop “Enter password for the encrypted rar file”, that time I am definitely sure, you are so angry. But don’t worry in this situation, I have a solution for you. Just download “RAR Password Unlocker”.


RAR Password Unlocker is design to crack the lost password of your winrar or rar file. RAR Password Unlocker supports all versions of the winrar or rar archive. It can recover any password. This application is too easy to use, but if you want to know how to use this tool then follow the steps given below.

Step 1. Open “RAR Password Unlocker”. Go to file menu and click open or click on the browse button.

Step 2. Now, choose the rar or winrar file from your computer that you want to unlock password and click Open

Step 3. Select brute-force attack (trying all possible combinations).

Step 4. Now, click start button to initiate the program

That’s it, the program is processing to retrieve the password. After sometime a message box pops up. It will displaying the expected password to you. 

Read More...

Sunday 14 April 2013

Yo Yo Honey Singh-Bring Me Back full Song Lyrics-Official Video


Song :- Bring Me Back
Singer :- Yo Yo Honey Singh
Album :- Die Hard 5




Bring Me Back Lyrics

Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back,

Ho Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back
Bring Me Back, Bring Me Back
Bring Me Back, Bring Me Back
Bring Me Back, Bring Meee

Main Teri Deed Da Pyasa,
Akhian Ch Merian Aasan,
Kado Hone Ne Deedar,
Rabba Mel Kra De Yaar,

Ohdi Bholi Bhali Akhian De Bhulekhe
Menu Painde Rehnde,
Te Ohna Akhian Vich Bhi Menu,
Athru Dikhde Rehnde,
Meri Sondi Rooh Ne Menu Uth Ke Jagaya,
Mere Kol Aa Ke Menu Ehsaas Jataya,
Ke Paisa Te Kamaya, Par Ishq Gawaya,
Mera Stardum, Wardum Kam Ni Aya,
Patandra, Dil Ronda Chandra,
Menu Chup Kra De, Meri Heer Mila De,

Ho Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,

Ho Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,

Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,
Bring Meeeeee

Meri Dead Body Ne Sar Jana,
Sab Kuch Khoohe Vad Jana,
Gal Jande Jande Main Keh Jani,
Oh Pyar Nishani Reh Jani,
Jehda Cheechi Paya Challa,
Ajj Reh Gaya Oh Kalla,
Oh Kehnde Othe Jannat,
Das Main Ki Karna Allah,

Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back,

Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,
Bring Me Back, Bring Me Back,
Bring Me Back, Bring Mee

Ho Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back,

Ho Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do,
Koi Deed To Karwa Do,
Bring Me Back, Bring Me Back,

Meri Jind Mod Ke La Do,
Mujhe Heer Se Mila Do

Read More...

Baghi full Song Lyrics-Jazzy B-Saada Haq


Album :- Baghi
Artists :- Jazzy B
Movie :- Saada Haq



Baghi Song Lyrics

Guru Dashmesh Baghi,Nalua Veer Baaghi,
saada baghi ae panth parivaar loko, saada khoon baghi,
saadi jaat baaghi,saada baaghiyaan naal vihaar logo,
baghi na saada, jamme baaghiyaan ne,
saada baghiyan nal pyar loko,
udham singh baghi, bhagat singh baghi,
te saada baghi sarabha kartar logo,
bhindrawala bhaaghi, rajoana baghi,
bhindrawala bhaghi havara jagtar bhaghi,
te kambdi baghiyan to sada sarkar loko,

ae gal tan har koi jaanda ae,
koma jeondiyan nal kurbaniyan de,
morran waliyaan apna hak laina,
maan torh ke dushat apmaniyan ne,
bhul jaan kurbani da na jehre,
banda bhatakda bhatakde bhatak janda,
ankhi kade tikaya ni atak sakde,
jodhe soore sira de gard sonde,
fansi latak de latakde latk jaande,
ankhi kade tikaya ni atak sakde,
kuj dil atakde atak jaande,

Duniyaa waleyo laina aanda saaanu saada haq,,
Read More...

Saturday 13 April 2013

Chadd Gayi Full Song Lyrics-Guru-Full Hd Video


Song :- Chadd Gayi
Artists :- Guri




Chhad Gayi Lyrics

Meinu chad gayi tu addh vichkaar
Tu karke pyaar kita inqaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar

Meinu chad gayi tu addh vichkaar
Karke pyaar kita inkaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar

Oh teinu dil ch vassya si
Dil tere nala laya si
Teinu din rata choune aa
Hass haas ronne aa
Teinu dil ch vassya si
Dil tere nala laya si
Teinu din rata choune aa
Hass haas ronne aa

Tu jit gayi main mann lyi haar
Kita inqaar tu karke pyaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar
Meinu chad gayi tu addh vichkaar
Karke pyaar kita inkaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar

Guru sab kujh hara geya
Kahda tere naal pyaar peya
Rabb manneya c main teinu
Dagga de gayi ae tu meinu....2x

Rog la gayi besumaar
Kita inqaar tu karke pyaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar
Meinu chad gayi tu addh vichkaar
Karke pyaar kita inkaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar

Ikk vara tu vapis aa
Tu door kadde naa jaa
Teinu rakh la koll mere
Dil di dhadkan ban ja ....2x

Supna kar gayi bekar
Kita inqaar tu karke pyaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar
Meinu chad gayi tu addh vichkaar
Karke pyaar kita inkaar
Teinu labh geya nawa dildaar
Layi naa saar kita inqaar

Read More...

Main Fan Bhagat Singh Da Full Song Lyrics-Diljit Dosanjh-Bikkar Bai Senti Mental


Song :- Main Fan Bhagat Singh Da
Singer :- Diljit Dosanjh
Movie :- Bikkar Bai Senti Mental
Lyrics :- Ikka




Main Fan Bhagat Singh Da Lyrics

Main fan bhagat singh da..
Jehra nahi si gulammi karda,
Rassa chum ke faansi da..
Hik taan ke sooli charda,
Mudd ke aaja veeriye ve..
Ardaas ahi nitt karda,
Main fan bhagat singh da..
Jehra nahi si gulammi karda,

24 saallan da gabru,
Si jad jaan desh ton vaari,
Zalim sarkaran agge,
Tu kade himmat na haari,
24 saallan da gabru,
Si jad jaan desh ton vaari,
Zalim sarkaran agge,
Tu kade himmat na haari,
Oye giddhran diya daraan toh,
Oh par sher kadon si darda,
Main fan bhagat singh da..
Jehra nahi si gulammi karda,

Jehri baldi seene ch 
Oss agg nu kon bhujawe
Vekh haal mullak da haye,
Meinu teri yaad satawe
Challe jhooth na duniyaa ve,
Etthe sachh roz hee marda,
Main fan bhagat singh da..
Jehra nahi si gulammi karda,

Mudd ke aaja veeriye ve,
Ardaas ahi nitt karda,
Main fan bhagat singh da,
Jehra nahi si gulammi karda

Read More...

Thursday 11 April 2013

How to download android apps/games from google play store to your PC


Today i am sharing a wonderful trick for those who are facing problem downloading Apps from Google Play using the older Google Chrome workaround. This amazing small tool called Real APK Leecher which allows you to download any Android application from Google Play directly on your PC. All you need is the account details of the Google Account connected to your phone.

How to download APK files using Real APK Leecher

Download Real APK Leecher(version 1.3.5)




Extract the zipped archive to a new folder.

Now browse to the folder and run Real APK Leecher.exe

On the first screen, you need to fill out your Google Account and other details. Be certain to use the account connected with an Android Phone. To locate out your Device ID, you need to install the Device ID app on your phone which can be downloaded from Play Store or directly from this link.



Also select your county to make determined apps only available only to that country are also listed.

Click upon save when you've filled all the fields.



The program will now open. Just type in the search bar at the summit right to search for the application/game which you desire to download.

Select your required app from the list of apps found and then right click to open the context menu with options.




Select Download this app and just wait for the download to finish. The APK file for the app will be saved to your default downloads folder.



Now you can do everything you desire to do with it. Send it to your phone to install.

Note : Only Free Apps/Games will be downloaded from this tool....
Read More...

How to Backup and Restore Your Website's data Using Cpanel

How to Backup and Restore Your Website's data Using Cpanel

What is Backup?

Backup is the process that can be used to restore the orignal after a data loss.The purpose is to recover data after its loss, be it by data deletion, corruption, Hacking or some other ways. So Backup is the most useful option to save your data, files and settings. In this post I will tell you how to create backup your website's data and settings and How to restore it.

 

What is Home Directory?

Home Directory :- Home Directory is the highest-level directory in your cPanel account's, which contains all of the files and directories used by domains managed through your account.

How To Create Backup of Home Directory

Step 1. First login to your cpanel.

Step 2. Then, go to Backup Wizard option


Step 3. In backup Wizard there are two options (Left side Backup and Right side Restore).


Step 4. Click on backup option

Step 5. There are 4 options (Full Backup, Home Directory, MySQL Databases and Email Forwarders & Filters.


Step 6. click on home directory

 Step 7. In Home Directory you will see an option(Download a Home Directory Backup), click on it, It takes some times and after that your backup will be start downloading.

That's it, Your Home Directory Backup will be downloaded.

What is MySql Database?

MySQL Databases :- MySQL Database is used to store web site information like blog posts or user information.

How To Create MySQL Database Backup

For create MySQL Database Backup follow above steps (Step 1 to Step 5).

Step 6. Click on MySQL Database Backup

Step 7. In MySQL Database Backup you will see all your databases, so click on that database which one backup you want, wait sometime and after that your backup will be start downloading.

That's it, Your MySQL Database Backup will be downloaded.

What is Email Forwarders & Filters?

Email Forwarders & Filters :- Email Forwarders will allow you to send copies of all your messages from one e-mail account to another and Filters allow to manage filters for each user and you can also test the existing filters.

How to Create Email Forwarders & Filters Backup

For create Email Forwarders & Filters Backup follow above steps (Step 1 to Step 5).

Step 6. Click on Email Forwarders & Filters

Step 7. In Email Forwarders & Filters you will see an option (Download Email Forwarders & Filters Backup), click on it, sometime later your backup will start downloading.

That's it, your Email Forwarders & Filters backup will be downloaded.

How To Restore Your Backup

Step 1. First login to your cpanel.

Step 2. Then, go to Backup Wizard option

Step 3. In backup Wizard there are two options (Left side Backup and Right side Restore).


Step 4. Click on Restore option.

Step 5. In Restore, you will see 3 options(Home Directory, MySQL Databases and Email Forwarders & Filters).


Step 6. If you want to restore Home Directory, then click on Home Directory and if you want to restore MySQL Databases then click on MySQL Databases and for Email Forwarders & Filters, click on Email Forwarders & Filters.

Step 7. After that, there will be an option(Choose File) to upload your backup.

Step 8. Click on Choose File, a new will be open on your screen, select that folder where you save your backup and upload it.

That's it, this process will take some time and after that your backup will Restore.

Read More...

What is permalinks? - How to Change Permalink Using WordPress

What is permalink ?

A permalink is the permanent URLs to your individual weblog posts, as well as categories and other lists of weblog posting. It is important because if you ever need to link to an exact blog entry, you use the permalink as your link. It's poor blog etiquette not to use the permalink. If you don't use the permalink, you'll just be linking to your main blog page. The problem with that is that, as you post new blog entries, the newest entry appears at the top of your main blog page and the other entries are pushed down on the page. The entry your readers are looking for may be down at the bottom of the page or already in the archives, your reader has no idea where to find the entry! If they click over to your website expecting to see a specific post related to a carnival and they see a different post, they may not take the time to find the real post they're looking for. So permalink is most important thing for any search engine optimization, expert will tell you that having a good permalink structure for your web site is key to its success. Permalink is most important thing for your website. It will also helps you to increase your website's traffic.

How to Change Permalink Using WordPress

Step 1. First, login your wordpress

 

Step 2. Now, go to settings

Step 3. In settings you will find an option called permalinks

Step 4. Click on it, in permalink you will see 6 Permalinks structures (Default, Day and name, Month and name, Numeric, Post name and Custom Structure).

 

Step 5. Now, choose those Permalinks structure that you want to use in your post's URL. 

Step 6. Click on Save Changes

That's it, your permalink structure will be changed.

Read More...

Types of DOS Attacks and How to Protect From a DOS Attack

DOS Attack (denial of service attack)

DOS attack (denial of service attack)is a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic and an attempt to make a machine or network resource unavailable to its intended users. It  consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the internet.


There are most important types of DOS attacks below :

  1. Flood Attack :- Flood attacks are the first known form of a DOS attack. The mechanism of a flood attack is simple attackers send more traffic to a server than it can handle. It the bandwidth of the victim is good, a flood attack has a chance to succeed only if it is a DDOS. Even if a webmaster adds more bandwidth, this still is not a sufficient protection against a flood attack. However, if the bandwidth is insufficient, even the normal volume of legitimate requests can look like a flood attack. Sometimes when a site gets traffic from popular sites, for ex. The front page of Digg, this could look like a DDOS attack but actually this is really legitimate traffic.

  2. Buffer Overflow Attack :- Most commonly used DOS attack, can be performed locally or remotely. Most commonly used attack method is using a vulnerable application of program. Result of compromise on security of network. Common modes of attacks are misuse of internal resources and altering configuration.

  3. Ping of Death :- In this type of attack an attacker deliberately sends an ICMO echo packet of more than 65536 bytes. IP Packet with size of 65536 bytes is oversized packet for TCP/IP stack. Many Operating System don’t know how to response to such huge packet resulting in freezing or crashing down, Attack mode can be classified as altering of configuration and misuse of resources.

  4. Smurf Attack :- The Smurf attack is one more way to paralyze a network, this time from the inside. The mechanism of a Smurf attack is more sophisticated and the critical part is to discover a broadcast server. When a hacker knows the broadcast servers in a network, he or she sends a ping request. The source IP address in this ping request is fake and it looks as if looks as if the ping comes from inside the network. When the broadcast server receives the ping request, the ping request is sent to the entire network and all the machines in the network return a response. These responses are further redirected by the broadcast server to the target machine. Smurf attacks are more difficult to defend against but still if a network is well planned and properly maintained, their effect shouldn’t be a devastating one.

  5. Teardrop Attack :- This attack takes advantage of fragmentation of IP packets during transmission. A large packet is chopped in pieces for easy transmission with each having sequence number in offset so that when all chucks get received they can be easily combined. In tear drop attack an attacker manipulates the offset value of the second or later fragment to overlap with previous or next one, This attack may cause hang and crash of system. Mode of attack is altering configuration.

  6. SYN Attack :- SYB attacks also exploit a weakness in the TCP/IP protocol. When a connection is established via TCP/IP, this involves a handshaking mechanism, which consists of the exchange of SYN and ACK messages. When a hacker floods the receiving system with SYN messages, this fills the SYN buffer. In this case the receiving party can’t send an ACK message and no TCP/IP connections with any hosts are possible.

How To Protect From A DOS Attack (denial of service attack) :-

With dotDenfender web application firewall you can avoid DOS attacks because dotDefender inspects your HTTP traffic and check their packets against rules such as to allow or deny protocols, ports or IP addresses to stop web applications from being exploited. Architect-ed as plug and play software, dotDefender provides optimal out of the box protection against DOS threats, cross site scripting, SQL Injection attacks, path traversal and many other web attack techniques. So dotDefender is the simple solution to protect you from DOS attacks.

 

Read More...

What is Virus?-Types of Viruses

What is computer virus?

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term virus is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability and a computer virus is an executable program. Depend on the nature of a virus, it may cause damage of your hard disk contents or interface normal operation of your computer.


A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wished. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a half. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Symptoms of a computer virus

  1. Reduced memory or disk space.

  2. Modification of data.

  3. An error message appearing on the computer screen.

  4. Files overwritten or damaged.

  5. Hard drive erased. Etc…

Types of Viruses


  1. Trojan Horse :- A Trojan horse is a malicious software program that hides insides other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into to operating system that enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls. They are spread by viruses, worms or downloaded software.

  2. Worms :- A Worm is a program that makes and facilitates the distribution of copies of itself for example, form one disk drive to another and it spreads without user interaction. Most worms begin as email attachments that infect a computer when they’re opened. The worm scans the infected computer for files, such as address books or temporary webpaged, that contain email addresses. The worm may do damage and compromise the security of the computer. Worms aren’t always destructive to computers, but usually cause computer and network performance and stability problems.

  3. Bootsector Virus :- A boot sector virus is a region of a hard disk, floppy disk or other data storage device that contains machine code to be loaded into RAM by a computer system’s built in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program stored on the same storage device. The location and size of the boot sector is specified by the design of the computing platform.

  4. Rootkit Virus : A rootkit virus is an undetectable virus which attempts to allow someone to gain control of a computer system. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook. Rootkits themselves are not harmful, they are simply used to hide malware, bots and worms. The term rootkit comes from the linux administrator root user. These viruses are usually installed by torjans and are normally disguised as operating system files.

  5. Spyware :- Spyware is a type of malware installed on computers that collects information about users without their knowledge. It capture what you type in your keyboard, including passwords, and send it to the spyware creator. Spyware can track Internet search habits and can also redirect your web browser to a different website than you intend to go to.

Read More...

How To Make Password Protected USB Drive Without Using Any Software and Unlock Password Protection, BitLocker Password Protection

How To Make Password Protected USB Drive Without Using Any Software

If you don’t want to show your USB Drive’s data to your friends, Family persons or others. So I’ll give you a very simple trick to lock your USB without using any application software.

There are many 3rd party applications available in online market but these application softwares are not available in full version, if you want to run that application lifetime then you want to pay to that but if you don’t want to spend money for that then this trick can helps you.


Just do these simple steps and you will make your USB Drive password Protected

Step 1. Plug in your USB Drive in your PC

Step 2. Go to Control panel, in control panel at the top right you will see an search box. In search box type BitLocker Drive Encryption.


Step 3. Now launch that application

Step 4. Then find your USB Drive and click on Turn on BitLocker


Step 5. Now your Windows will ask you to set a password


Step 6. Click on first check box (Use a password to unlock the drive) and Set a strong password twice and click on next.


Step 7. Now you will see two options (Save the recovery key to a file and Print the recovery key) choose that option which one suites you best and click on next.


Step 8. Now click on Start Encrypting


That’s it, it will take some time for encrypting your USB and after that your USB will be password protected and if someone tries to access you USB Drive, Windows will ask him or her to enter the current password.

Note : This trick is only works in Windows

How to Unlock Password Protection or Change Password

Step 1. Plug in Your USB Drive in PC

Step 2. Go to Control Panel and then BitLocker Drive Encryption

Step 3. Now find your USB drive and click on “Turn Off BitLocker”


That’s it..

For change password

Do above step 1 and 2 and then

Step 3. Now find your USB and click on “Manage BitLocker” in Manage BitLocker you will see five options (Change password to unlock the drive, Remove password from this drive, Add a smart card to unlock the drive, Save or print recovery key again, Automatically unlock this drive on this computer). Click on Change password to unlock the drive option and change password.


Note : In your Windows, there is also an another simple way to find BitLocker. Just go to my computer and find your USB Drive and right click on it and find an option called bitLocker. Click on it and after that do all above’s steps.


 

Read More...