Skip to main content

Remove Shortcut Virus From Pendrives and Memory Cards without Antivirus

Remove Shortcut Virus From Pendrives and Memory Cards without Antivirus

If all your folders in pendrive/flash drives or memory cards are converted into shortcut icons then it is a good news for you. image
Now I’m going to tell you how to remove this virus without using any antivirus software. If you have not formatted your flash drive then you can solve this problem.

Most of the people come across this type of issues with their working environment.  So for solving it follow the steps given below:

Steps are very easy

First of all Click on Start >> Run >> and type cmd and click on OK
Here I assume your pen drive letter as G
Enter this command.
attrib -h -r -s /s /d g:\*.*
You can copy the above command >>  Right click in the Command Prompt and 
paste it. 
Note : Don't forget to replace the letter g with your pen drive letter. 
Now press Enter 
That’s it!

Now you can  check for your files and folder in  Pen Drive.

TIP: You can open Run Command using your ketboard shortcut key combination. Press  Ctrl + R

Comments

Popular posts from this blog

Hacking Cyberoam(Bypassing)

Hacking Cyberoam(Bypassing) Module A : Find open ports and your organization IP Step 1 : Download Free Port Scanner Software The first software required to crack software is a free port scanner software. download from  http://hotfile.com/dl/13028395/0467e17/FreePortScanner.rar.html It is also available on  http://www.nsauditor.com/network_tools/free  port scanner software Step 2 : Install free port scanner. Step 3 : Detecting the static IP assigned to your organization. you need to find out the static IP assigned to your organization which is allocated by the ISP Goto  www.WhatIsMyIP.com Here the site will display your IP address. Please note down your IP address which we will be using again in the further steps. Step 4 : Scanning open ports for your external IP address. Entering IP address whose port has to be scanned.                        Note the active port :                       Module B: Configuring proxy server Step 1 : Download Proxifier – proxy software To hack cyberoa

How to configure tor network in all browser

1. Download Vidalia Bridge Bundle https://www.torproject.org/download/download.html.en 2. click on start tor on Vidalia control panel 3.Wait till it connect to proxy servers 4.Go to Internet Explorer  5.Go to tools -> internet options 6.Click on Lan settings. 7.Click check on use proxy then click on advanced button 8.Proxy setting only socks ip of 127.0.0.1 and port 9050 9.Click ok and done

Hacking Aspx / Php websites (ACTIVE SQL INJECTION)

Hacking Aspx / Php websites (ACTIVE SQL INJECTION) hey guys in this tutorial i will show you how to make a injection on a aspx based website.  1) seach aaspx website.  for this step you can use one of this dorks  ".aspx?bookID= "     OR         ".php?id= " 2) If you found one lets check if the website is vulnverable. Add this text after the url  "order by 1--"  example : http://www.target.com/index.aspx?Id=1 order by 1--  Now you will get a Error : "Page not found" or something like that.  3) Lets go on and begin with the Injection the first step of every injection is to find out the columns.  for this step we use :  "having 1=1"  you only have to copy it behind the url  example : http://www.target.com/index.aspx?Id=1 having 1=1  4) Well lets go on and search the tables. Use this code for it  and 1=convert  example : http://www.target.com/index.aspx?Id=1 and 1=convert  The output is the first table of the databse. But this table