Author: cybradm

What Are Captchas?

I’m sure you have encountered captchas in the internet, you are just not aware with its name or how does it look like. Commonly these are images that are computer generated that display a combination of numbers or letters or mixed. These are used on blogs, or forum registrations in which we have to type to continue or to complete the registration process.

CAPTCHA stands for Completely Automated Public Turing-test to tell Computers and Humans Apart. It will recognize if you are just using a bot or automated software to register or comment with sites that uses captchas because you can’t solve it by any means. If you are a real human being solving captchas is very easy as you just need to copy what is shown or just answer what is being asked. CAPTCHAs test prevent about 90% of hackers attacks.

How to Delete Your Firefox History

Deleting Mozilla Firefox history is a must, especially if you are browsing on a shared computer or public computer like for example internet café, or anywhere else which is not safe and secure. Other users can steal your important login credentials like bank account access, social media passwords, and even spy on what websites that you always visit.

Firefox store all information on its history what you have downloaded, visited, recently closed tabs and etc. To simply clear the history of your browser, just click ctrl + shift + delete and select “everything” and click clear now and voila! You have cleared your Firefox history.

How To Password Protect USB Flash Drives

Flash drives are very useful nowadays, it is very handy and it is available in different capacities ranging from 2GB to 128GB depending on brand. I’ve been using flash drives for my day to day work and as a means of reformatting my client’s computers because I don’t need to burn a DVD disc anymore. Another advantage of having a flash drive is that you can access your files anywhere download/upload and even share your files to your employers remotely.

But in such cases, data security is a persistent problem because as you plug your flash drives on different computers there is a huge risks of being infected by viruses, Trojans, and worms which can harm your important data. Worse case is when your flash drive was lost or compromised, sensitive data could fall in the wrong hands. But there’s a solution to this, password protect your flash drives!

You can simply add a password as security to your USB flash drives so that only you or authorized users can access the data. There’s two types of security measure you can use, a simple password protection wherein data cannot be seen without entering a password and there’s encryption, in which the data is actually encrypted and can be decrypted and accessed only with a password.

How to Detect and Remove key loggers from your PC

If you are regularly visiting an internet café to play online games, or just to check your social media accounts there is a high risks of being key logged by other users of course for several reasons possible. FYI, Key loggers are software specialized in capturing all the information that enters your computer when you type with the keyboard. Many individuals use this kind of technique if they want to hack someone’s game password, or if they want to stalk to a person’s social media account especially to ladies. Others will use this for more serious intent like for hacking your bank account and checking your other personal information.

Not just in the internet cafés keylogger are present but even in your own personal computer as it can be installed remotely or it can be attached to a software that you’ve accidentally installed into your pc.To detect if you are infected with such threat, you can see changes that you have not done or see attempted entries into your social media account or email, or your game account loses some gaming currencies and items.

If you find that it is a key logger then you must uninstall it immediately. You can also perform a full scan of your antivirus and be sure to update it constantly. You can also install an antikeylogger program that allows you to automatically detect any key logger installed.

How to create a folder without name

What I’m about to share is a trick, which I guess not useful enough but I know some of your friends will find this one really cool. It Is how to create a folder without a name. To do this just follow these simple steps. First select a folder or just create a new one then remove the name by pressing the F2 or right clicking on it and selecting rename. While deleting the name of the folder be sure that your keyboard Numlock is On and then press ALT button and type a code 0160 by the help of your number pad and press Enter and voila! Now you will see that there is no name on it. If you find this simple trick cool enough feel free to share it on your Facebook or Twitter account.

Tab Napping – New Phishing Scam

If you are now are of Phishing, it is actually a technique use by hackers to steal your personal information such as usernames and passwords and other important information that will benefit them. Now there is a new phishing scam called Tab napping, where user does notrequireto click on any URL to redirect them to the phishing site instead it will trigger one of your inactive tab to automatically replaced by with a new tab without notice as we all know that opening multi-tabs now in browser is use by many people

To give you a good example, for instance you have opened your bank account in one of your tabs and became inactive for a few minutes with tab napping it will be automatically replaced with the phishing site of your bank and youwill be askedto enter your Usernameand password as regular phishing sites do. You might think youhave been signedout or never logged in but when you will enter the details again itwill be sentto the hacker already.

USB 3.1 Cables and Connectors Revealed

If you are still using USB 2.0 flash drives then you might want to try USB 3.0 external drives and thumb drives to experience how fast to transfer files with this kind of technology. I’ve been using my USB 3.0 external drive a couple of years and it’s still working perfectly, transferring downloaded movies from my pc to the drive in just a short period of time.

The good news is there is already information about the next generation USB 3.1 cables/connector featuring much more user friendly design and much faster transfer rates (up to 10Gbps compared to the 5Gbps on the previous generation USB 3.0. There is information given that there are two types of end connectors in the case of Type C, so you can plug it in without worrying about direction and orientation. Plus, you don’t need to worry about vertical orientation either.

How to extend your laptop battery life

I’ve been using laptop and netbook for almost 6 years and based from my experience it is not hard to extend your laptop battery life as long as you are not abusing the system itself. Here are some helpful tips you can follow to save your battery from retiring early because if you are not aware, Laptops original batteries are really expensive to buy. So try the following steps and save some battery life :)

Step 1: If you’re using Windows OS. Right click on your desktop, click properties and then select screen saver, then select powerand click power scheme and then select maximum battery life.

Step 2: Always turn down the brightness of your laptop, same with your android phone it will save a lot of juice.

Step 3: Always charger your batteries when they completely drained or nearly battery empty.

Step 4: Only use the battery if you are going outside, in a mall, or a picnic. If you are only working at home or in the office run the laptop by removing the battery and then connect the plug to main switch as an AC mode.

Step 5: Avoid heavy multitasking, try to open a single or two applications only at the same time.

If you find these tips useful enough, please share it to your friends.

How to Enable Right Click on Right Click Disable Blogs

I’ll be sharing a trick that you can use on other website if you want to copy important information for your research or something as we know that there are tech savy out there that will apply the “disable right click” function to their blog to protect their site from plagiarism.

Here’s the code that you need to enable right click on the page that has disabled right clicking.


With the most cases this will work perfectly and enable you to write click on any web page and do whatever you want. If you find this tutorial good enough, please share it to others via Facebook or Twitter.

How to Reset Windows Password via command line

I know most of us already experience a random blackout in our mind – it could be your ATM pin, email password, and even your Windows password. But you don’t have to panic as there also a solution to this if you can’t remember your password at all. All you need is a copy of the Windows installation disk and follow this step by step command line trick to reset your Windows password.

First, insert your installation disk then restart your computer. Once on the boot screen select the DVD ROM and proceed to “repair your computer” option from the lower left-hand corner.

Just follow through the steps until you get to the option to open the Command Prompt, which you’ll want to select.

You need to overwrite the Sticky Keys executable with the Command Prompt executable. Sticky Keys is an accessibility feature that allows a user to tap the Shift, Ctrl, Alt, or Windows key once to achieve the same effect as holding the key down.

When you are already there, type in the following command to back-up the original sticky keys file:

copy c:\windows\system32\sethc.exe c:\

Then you’ll copy the command prompt executable (cmd.exe) over top of the sticky keys executable:

copy c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe

Now you can reboot the PC.