Posts

Showing posts from May, 2017

Ways To Remove Shortcut Virus Permanently

Image
1.Removing Shortcut Virus Using CMD Method (Command Prompt) If you do not wish to install any other  shortcut virus remover  application , then you can simply remove shortcut virus from your PC/laptop or pendrive by using a command prompt (CMD). Even if you are a non-techy person then also you can easily remove shortcut virus from your pendrive or PC by following the CMD tutorial. Steps To Delete Shortcut Virus By Using CMD: Open command prompt (CMD). (Go to Run >> type CMD >> Hit enter ) Type the drive letter of your removable device and a colon after it and hit enter. (Eg:  g: ) Now type:  attrib g:*.* /d /s -h -r -s  . (Replace  g:  with the drive name of your drive) Hit enter.  Tips To Prevent Shortcut Viruses In Future Prevention is always better than the cure. Its highly recommended to take few precautions to keep your computer away from any kind of shortcut virus or trojans. You should always use updated antivirus and firewalls to keep virus a
Image
A slow computer can throw even the most patient folks into a fit of rage. Whether your computer takes forever when booting up or freezes regularly, any time you wait for the system to get its act together amounts to wasted time. Now I have an video in HINDI language, How to make your computer superfast!             JUST FOLLOW THESE SIMPLE STEPS IN THE VIDEO :- -Ayush Rana      
Image
    Ransomware is malicious code that is used by cyber-criminals to launch data kidnapping and lockscreen attacks. The motive for ransomware attacks is monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions for how to recover from the attack. Payment is often demanded in virtual currency to protect the criminal’s identity. Ransomware malware can be spread through malicious e-mail attachments, infected software apps, infected external storage devices and compromised websites. In a lockscreen attack, the malware may change the victim’s login credentials for a computing device; in a data kidnapping attack, the malware may encrypt files on the infected device as well as other connected network devices. Ransomware kits on the deep web have allowed cybercriminals with little or no technical background to purchase inexpensive ransomware-as-a-service (RaaS) programs and launch attacks with very little effort