Trick to Create Hidden Partition in Pen drive

Secrecy of Data is an essential work, but is difficult to maintain. Whenever we talk about Pendrives unfortunetly to make data confidential in pendrives is so challenging .These days, Most of data sharing is dependent on pendrives. So that’s why, data security is bottleneck to a layman.So, today I’ll give you a trick to Make […]

How to see who views your Facebook profile

Facebook doesn’t provide any feature to let you know about who views your Facebook profile, but we have one trick for you which will guide you for how to see who views your Facebook profile. Also make a note that this trick only works on Google Chrome and not in other browsers. Method for How […]

Facebook Legacy Contact: Who Can Access Your Account When You Die?

Have you ever thought what will happen to your Facebook account when you die? It may get on the wrong person hands. So it’s better to let someone access your Facebook account after you die and not before that. The feature is provided by the Facebook itself as Facebook legacy contact where the selected contact […]

How To Partition Hard Drive in Windows 7 Without Formatting

With the advent of the technical world comes new operating systems each with some more facilities than its predecessor. The same happened with Windows. Recent operating systems like Windows 7 and also Windows Vista has a great dexterity in them that the hard disk can be partitioned, re-sized without formatting your computer. Here, we discuss […]

How to Hide Files Behind JPEG Image Using Command Prompt

Hiding files by some sort of software has been a very common way till now, but if you are looking for something different you can do it by hiding a file behind a jpg image. We have written two more Articles about hiding files or folders in Windows XP. A handy and secured way to […]

Warning! Hackers Started Using “SambaCry Flaw” to Hack Linux Systems

Remember SambaCry? Two weeks ago we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software (re-implementation of SMB networking protocol) that allows a remote hacker to take full control of a vulnerable Linux and Unix machines. To know more about the SambaCry vulnerability (CVE-2017-7494) and how it works, you can read […]

How To Recover Deleted Sticky Notes In Windows

Sticky Notes, first introduced with Windows Vista, is an amazing utility to quickly write down ideas or everything else that comes to your mind. The native Sticky Notes program Windows 10/8/7 doesn’t offer features available in some third-party programs but it’s a good solution to quickly jot down a contact number, email address or write […]