How to view hidden private profile picture in Facebook

Social networking giant Facebook is used by one and all to be in contact with our friends,colleagues,family and loved one’s.With social media we always need some privacy and Facebook provides us the same via Privacy Settings.Privacy settings in Facebook help the users to hide or lock their profile pictures and other pictures from public or […]

Facebook Legacy Contact: Who Can Access Your Account When You Die?

Have you ever thought what will happen to your Facebook account when you die? It may get on the wrong person hands. So it’s better to let someone access your Facebook account after you die and not before that. The feature is provided by the Facebook itself as Facebook legacy contact where the selected contact […]

How To Partition Hard Drive in Windows 7 Without Formatting

With the advent of the technical world comes new operating systems each with some more facilities than its predecessor. The same happened with Windows. Recent operating systems like Windows 7 and also Windows Vista has a great dexterity in them that the hard disk can be partitioned, re-sized without formatting your computer. Here, we discuss […]

How To Recover Files From Corrupted USB Drive !!

There are numerous reasons that lead to data corruption, due to viruses or if the drive is unmounted improperly from the port. Therefore, we are going to share three easiest methods that will help you to recover files from corrupted USB drive. Go through the post to know about it. The best way to recover data […]

How to Hide Files Behind JPEG Image Using Command Prompt

Hiding files by some sort of software has been a very common way till now, but if you are looking for something different you can do it by hiding a file behind a jpg image. We have written two more Articles about hiding files or folders in Windows XP. A handy and secured way to […]

Warning! Hackers Started Using “SambaCry Flaw” to Hack Linux Systems

Remember SambaCry? Two weeks ago we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software (re-implementation of SMB networking protocol) that allows a remote hacker to take full control of a vulnerable Linux and Unix machines. To know more about the SambaCry vulnerability (CVE-2017-7494) and how it works, you can read […]

How To Recover Deleted Sticky Notes In Windows

Sticky Notes, first introduced with Windows Vista, is an amazing utility to quickly write down ideas or everything else that comes to your mind. The native Sticky Notes program Windows 10/8/7 doesn’t offer features available in some third-party programs but it’s a good solution to quickly jot down a contact number, email address or write […]