Friday, December 26, 2014

Recover Deleted Files

Recover My Files


Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.

Recover My Files - Data Recovery SoftwareSolution
Recover files even if emptied from the Recycle Bindata
File recovery after accidental format, even if you have reinstalled Windows.recovery
Disk recovery after a hard disk crashsoftware
Get back files after a partitioning errordata
Get data back from RAW hard drivesRAW drive
Recover documents, photos, video music and email.recovery
Recover from hard drive, camera card, USB, Zip, floppy disk or other mediasoftware



Data Recovery Software Download
Current Version: 4.6.8.1012
Data recovery software download
100% Safe, 100% Secure







To Recover deleted or corrupt photos:

DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, its best that you can recover all your deleted data from the flash memory cards used in cameras.

DiskInternals Flash Recovery is a flash memory file recovery tool that restores all corrupted and deleted photographs or the ones that were lost due to hardware malfunction. This utility works even if a memory card was re-formatted.




Features:
• Easy Recovery Wizard.
• Can preview and recover JPEG, JPG, TIFF, BMP, PNG, GIF, TGA and other images.
• Can preview and recover RAW images:
• CRW - Canon Digital Camera Raw Image Format.
• CR2 - Canon Digital Camera Raw Image Format version 2.0.
• NEF - Nikon Digital SLR Camera Raw Image File.
• PEF - Pentax Raw Image Format
• RAF - Fuji CCD-RAW Graphic File.
• X3F - Sigma Camera RAW Picture File.
• BAY - Kodak/Roper Bayer Picture Sequence.
• ORF - Descent 3 Outrage Room Format.
• MRW - Minolta Diamage Raw Image File.
• RAW - Image Alchemy HSI Temporary Raw Bitmap
• SRF - Sony DSC-F828 Raw Image File.
• Other RAW images
• Works under Microsoft® Windows® 95, 98, ME, NT, 2000, XP, 2003 Server.
• Supported file systems: FAT12, FAT16, FAT32, NTFS (NT 4), NTFS5 (2000, XP).
• Recovered files can be saved on any (including network) disks visible to the host operating system.
• Creates recovery snapshot files for logical drives. Such files can be processed like regular disks.

                                                                                                 
                                                To Download 
DiskInternals Flash Recovery 4.2 full download








[Software Update] Opera 26 Now Available for Download

Good news for Opera users! Opera team has released new Opera 26 for Windows, Linux and Mac which comes with following updates:







  • Share bookmarks: Ability to share bookmarks with others
  • Import bookmarks and other data: Now you can import bookmarks, cookies, history and passwords from Opera 12, Google Chrome, Mozilla Firefox, Internet Explorer and Safari web browsers using "Settings -> Import bookmarks and settings" option (old method)
  • Linux build: Stable build also available for Linux users
Important updates in previous Opera versions:
  • Visual Bookmarks: New way to add and organize your favorite websites with thumbnail preview
  • Web Notifications: Developers can deliver native alerts and status information to users
  • Built-in PDF Viewer: View documents directly in the browser without installing any extension
  • Experimental Start Page for Testing: Includes new stylistic treatments for Speed Dial entries and the Discover feature
  • Allows users to show webpage's complete URL in address bar [Link].
  • New Heart menu in combined search : Allows you to add/remove webpages in Speed Dial, Stash and bookmarks bar.
  • New Speed Dial settings: You can change look of Speed Dial entries to big thumbnails or manually customize their height and width.
  • Dragable bookmarks: You can drag tabs to bookmarks bar to add them or drag your bookmarks to Speed Dial to create new entries.
  • Tab Previews: Hover your mouse cursor over a tab to preview its content
  • Private Window Color: Different background color for private browsing windows
  • Full Use of HiDPI Screens: Fixes and enhancements for how Opera handles high-resolution screens
  • New UI for allowing blocked content in a secure session.
  • New Default themes included in the theme manager.
  • Displays a broken padlock icon for secure sites that have invalid security certificates.
  • One-click install functionality for extensions.
  • Enhanced support for Chromium extensions.
  • New silent update mechanism on Windows to keep Opera always up to date.
  • Smaller updates to reduce bandwidth usage.      

You can download it from the link given below:-

Thursday, December 25, 2014

Proxy server

Proxy Server

A proxy or proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy server which then processes your request and returns what you were wanting. In this way it serves as an intermediary between your home machine and the rest of the computers on the internet. Proxies are used for a number of reasons such as to filter web content, to go around restrictions such as parental blocks, to screen downloads and uploads and to provide anonymity when surfing the internet.

Why Use a Proxy?

If you are wanting to surf the web anonymously then proxies can provide you with a means to hide your home IP address from the rest of the world. By connecting to the internet through proxies, the home IP address of your machine will not be shown but rather the IP of the proxy server will be shown. This can provide you with more privacy then if you were simply connecting directly to the internet. There are number of proxies that can provide you with service. You can find a list of these simply by typing “Proxy List” into any search engine. There are some proxies which are free and some which charge money, the choice is up to you but we have found that the paid proxies are more reliable, faster and more secure.
Proxy servers have two main purposes:




  • Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access theWorld Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such asAmerica OnlineMSN and Yahoo, for example, employ an array of proxy servers.
  • Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.           


    The operating principle of a proxy server

    The basic operating principle of a proxy server is quite simple: It is server which acts as a "proxy" for an application by making a request on the Internet in its stead. This way, whenever a user connects to the Internet using a client application configured to use a proxy server, the application will first connect to the proxy server and give it its request. The proxy server then connects to the server which the client application wants to connect to and sends that server the request. Next, the server gives its reply to the proxy, which then finally sends it to the application client.








    Example of How a Proxy Server Work


    how proxy server works diagram
    Figure 1) Two computers, connected through a third computer (shown in red) acting as a proxy, communicate with each other (shown in grey).
    The drawing of Alice (client computer), Proxy, and Bob (web server) shows how a proxy server theoretically works. Alice can relay questions to Bob through the proxy server using the proxy server’s IP address without having to contact him directly. Bob, from his perspective, thinks he is communicating directly with the proxy.
    In practice, not all web proxies are created equal. There is a huge variance in how a web proxy can be set up and its technical capabilities. Decoding how a web proxy provides clients with enhanced privacy and security primarily depends upon how the individual proxy handles the individual data packets (the information postcards of the Internet) traveling between Alice and Bob, use of encryption techniques, and the intent of the proxy owner.

    Here are three basic communications that a web proxy server might communicate with the users:

    1. What is the current time?
      The web proxy takes the message from Alice, and adds its own IP address to the network section of each data packet from Alice. This additional information functions like a postcard that has had a new return address stuck on top of the old. Bob gets a message sent from the new IP address, his response goes to the proxy, and then sends the message on to Alice.
      A shielded IP address from a web proxy may be sufficient for computer users to get around some site restrictions on content. For example, someone in Europe visiting a US site that limits access to computer users with an American IP address can access the site with a shielded IP address from the web proxy.
      However, site access is different from security. If proxy communication with the site is not encrypted with HTTPS protocol, data packets can still be easily dissected to uncover the original user's IP address.
    2. Alice had me to ask you “what time is it?”
      Some web proxies will not cover up Alice's address. Similar to a “Forward to” note on a letter, they can add their IP address to data packet headers as HTTP_FORWARDED or HTTP_VIA without covering up the original IP address. For those wanting to shield their IP address and their identity, this is an incomplete solution.
      As the name suggests, for most proxy servers, the IP address is only shielded for web browser activities – not for other connected online apps. Skype VOIP, as just one example, collects and can broadcast a user's real IP address.
    By definition, web proxies are well placed to filter and restrict content. They are also positioned to read unencrypted messages and to keep logs of who is sending messages to where. With the unencrypted HTTP protocol, data packets are open postcards that can be easily sniffed out and read – even if the users' IP address has been shielded.
    Web proxies also provide limited security to users because they are not technically structured to warn users if data packets have been altered during transit or to certify that only Alice and Bob are in a secure, point-to-point conversation. While some web proxies may include encryption, it is not a guaranteed element.
    For consumers wanting to surf the Web privately and securely, a better solution is a VPN (virtual private network). A VPNencrypts all your internet communications while hiding your IP address to protect your privacy. What this means is that anyone trying to sniff your traffic will not be able to decipher it since it’s encrypted.

    Open Blocked Sites in College or Office

    Blocking of some sites in college campuses or office is quite common. One always wish to open up the blocked sites. Yes it is possible to open the blocked sites like torrent, facebook, youtube. This article is all about accessing the blocked site . It has been divided into levels.

    Levels are as per the security of your ISP. 
    Like if you can access the blocked site by using tips and tricks in level 1, you need not to go to further levels. 

    LEVEL 1:


    If you are connected using the LAN/wifi by your ISP then you can crack the security by two various methods...

    #Proxy_SERVER Method:

    Proxy server is basically spoofing up of your current location to your ISP. In this method what all we need to do is access the proxy servers. In this post you will have the option to chose the proxy server from a number of servers.
    What you all have to do is just open your browser and type the following URL.

    www.prontoproxy.com 

    1. You will now receive the page as shown below



    2. Type the URL you need to access in "ENTER URL:" column . say www.youtube.com for example and then press the GO button.





    3. You will now notice that you can successfully access youtube.
       
         Congratulations! You can now access your blocked sites


    Now in case if you are not able to access this as it might have been also blocked by your office or college ISP. You can use any of the other server like --


    www.anonymizer.ru   -Its a server of russia so the webpage language will be russian ofcourse





    free-proxyserver.com





    www.meebo.com/

    www.iloveim.com/

    www.the-cloak.com/
      
    www.cantblock.me

    www.mb35.info

    www.cloaking.me

    www.proxybrowsing.com

    www.behidden.com

    www.yourfreedom.net

    www.hujiko.com

    www.schoolproxylists.cn/

    www.xysurfing.com/

    www.googlefaker.com/

    www.internetoxy.com/





                                          LEVEL 2:


    You can use some of the tools to bypass your blocked security. They too act same like online proxy servers. Once you install them and run in the bsckground you are pretending to be somewhere else.
    Some of the preferres tools include---



                                        LEVEL 3:


    It includes changing proxies within browser itself. A list of anonymous proxies can be downloaded from www.anonymizer.ru/proxy

    Steps to change settings in various browsers--

    @ Mozilla Firefox

    1. Open Mozilla Firefox.

    2. Click on Tools then click on Options….

    3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings… button.

    4. Tick the Manual Proxy Configuration: radio button.

    5. In the HTTP Proxy: box, type the IP address of the proxy server.

    6. In the Port: box, type the in the port number that is used by the proxy server.

    7. Click OK to close the Connection Settings window.

    8. Click OK to close the Options window.

    9. DONE



    @ Internet Explorer


    1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
    2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
    3. In the Address box, type the IP address of the proxy server.
    4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
    5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
    6. Click OK to close the LAN Settings dialog box.
    7. Click OK again to close the Internet Options dialog box.


    @ Mozilla Firefox

    1. Open Mozilla Firefox.

    2. Click on Tools then click on Options….

    3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings… button.

    4. Tick the Manual Proxy Configuration: radio button.

    5. In the HTTP Proxy: box, type the IP address of the proxy server.

    6. In the Port: box, type the in the port number that is used by the proxy server.

    7. Click OK to close the Connection Settings window.

    8. Click OK to close the Options window.

    9. DONE

    @ Internet Explorer

    1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
    2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
    3. In the Address box, type the IP address of the proxy server.
    4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
    5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
    6. Click OK to close the LAN Settings dialog box.
    7. Click OK again to close the Internet Options dialog box.



    @ Safari.
    * To change proxy settings: Open Safari
    * Click Safari on top of the screen.
    * Click "Preferences".
    * In the menu bar at the top of the window, Click "Advanced".
    * Click on the "Change Settings" button next to the Proxies label
    * Click on the check box button next to Web Proxy (HTTP)
    * Enter proxy server and port information
    * Select "Apply Now" to save settings.
    * Done.




                                                          [updation in progress]

    Thursday, December 11, 2014

    Create your own Locker and make your files Private

    Having important files and documents? Need to secure or privatise your files?
    Now you can create you own locker. One that can be unlocked only by a key like a simple lock.
    So Lets Start ...


    1. create a folder of any name(say 'AA' for an example)
        [suppose the folder AA contains your important files you need to make private]

    2. open Notepad
    3. copy and paste the following command
         
         REN AA PROTACTED.{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0}

    4. save the file naming it as LOCK.cmd chosing save type as All Files

    5. Now double click the file LOCK.cmd 
        The folder 'AA' gets protacted and cannot be accessed .

    6. Now to Unlock the folder
    7. open Notepad again and now copy and paste the following command 

         REN PROTACTED.{2559a1f7-21d7-11d4-bdaf-00c04f60b9f0} AA

    8. Save the file naming it as UNLOCK.cmd and chosing save type as All Files

    6. Now double click the file UNLOCK.cmd 
        The folder 'AA' gets unlocked .

         The two files can now be used as a lock key and unlock key 

                 Congratulations! You have successfully created your own locker.





          

    Remove shortcut virus from your pendrive

    Shortcut virus is something untolerable. It hides the files that are copied into a hard drive. No doubt the files that got hidden can be made visible by [Step 1:] opening hidden files and folder ====>

    for Windows 8/8.1 

    1. click on view menu 
    2. select hidden items present on the right side.

    for Windows 7

    1. click on Organise
    2. select folder and search options ==> view ==> 
    3. then check the option of show hidden files and folder
    4. click on apply ==> ok 


    This makes the files/folders visible.
    you can copy them to your hard drive now.
    [Remember not to click on the shortcut of files and folder. Else the virus gets copied to system files]

    this completes step 1.

    Step 2:


    1. Remove your pendrive

    Now download AutoRunExterminator
    [click on the highlighted link above to download]

    2. It will be zip file of  around 16 kb. Extract the file.

    3. open the folder and double click the exe file(AutoRunExterminator.exe).

    4. now insert your pendrive and open Command Prompt 
       (to open command prompt ... click on start menu ==> Run ==>  then type cmd  and click ok )

    5. now copy and paste the following command
        attrib -h -r -s /s /d drive letter:\*.*  
        
        eg- if the drive letter is H
           then type   attrib -h -r -s /s /d H:\*.*

    6. after typing the command click on enter.

    7. Now all you need to do is to have a custom scan of your pendrive by a antivirus or antimalware.
         I prefer Windows Defender(for 8 and 8.1) . 
         Windows 7 users can download mbam malware 
          [click on the highlighted link above to download]

    8. After performing scan and eliminating threats Format your pendrive.

        

            Congratulations. The shortcut virus is now completely removed from your system