Windows & Network Administrator Portal Headline Animator

Wednesday, November 20, 2013

How to Recover Virus Infected Hidden Files from Pen Drive or Flash Drive Step by Step

This process is applicable not only for Pen Drive or Flash dives like External Hard Disc, but also applicable for your system drives also.

When we scan Flash Drive with updated antivirus we found that Flash Drive is completely empty with no data at all.

But used disc space is showing a lot of data.



Also tried ‘Show Hidden files’ option in ‘Folder Options’ but No use




Open Run (Win+R) and type cmd and press Enter.



A command Prompt will appear, type cd\ and hit enter.. This command will let the command applicable to Root directories and sub folders also.


Type I: and Enter {Note: Type your driver letter in the place of I. (ex G , H.. etc}


Type dir/ah and Enter. This Command useful to identify the directories effected by the viruses.




Now type attrib –h –s /s /d and hit Enter [attrib –h{space}-s{space}/s{space}/d]

After a few seconds you can see your driver letter again this means the process is completed.


Now your all data is back.


After applying this command, some of the strange folders you have never seen may appear but don't worry, they are system related files, just hide them if you don't want or try delete if possible.

Thursday, February 21, 2013

Computer Networking Question with Answer



1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of cables and protocols used in order for one device to be able to communicate with the other.
2) What is a node?

A node refers to a point or joint where a connection takes place. It can be computer or device that is part of a network. Two or more nodes are needed in order to form a network connection.
3) What is backbone network?
A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles management of bandwidth and various channels.
4) What are the layers of the OSI reference model?
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer and Application Layer.
5) What are routers?
Routers can connect two or more network segments. These are intelligent network devices that store information in its routing table such as paths, hops and bottlenecks. With this info, they are able to determine the best path for data transfer. Routers operate at the OSI Network Layer.
6) What is point to point link?
It refers to a direct connection between two computers on a network. A point to point connection does not need any other network devices other than connecting a cable to the NIC cards of both computers.
7) What is a LAN?  
LAN is short for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.
8)What is anonymous FTP?
Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to data in these servers do not need to identify themselves, but instead log in as an anonymous guest.
9) What is subnet mask?
A subnet mask is combined with an IP address in order to identify two parts: the extended network address and the host address. Like an IP address, a subnet mask is made up of 32 bits.
10) What is the maximum length allowed for a UTP cable?
A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.


* Please feel free to add any other comments or ideas you may have.You're invited to share your thoughts.*

 ****** Visit My Blog Everyday for more Latest Update .Bookmark  Or Subscribe RSS Feed *******

Monday, February 18, 2013

IT Quiz


Test Your IT Skills
Q:-1 How Many layers are present in OSI Model ?
a) 4
b) 5
c) 6
d) 7
Q:-2 Java is Platform independent ?
a) True
b) False  

Q:-3 What is the use of sleep command in UNIX ?
a) It suspends program execution for a specified period of time
b) It will abort the sheel script and will exit
c) None of them

Q:-4 Javac is primarly
a) Java Complier
b) C complier
c) c++ complier
d) .Net complier

Q:-5 What does JVM stands for ?
a) Juniper Virtual Machine
b) Java Virtual Machine
c) None of the them
 
Q:-6 Unix Kernel is Written in C language ?
a) True
b) False

Q:-7 MongoDB is a ___
a) Mailserver
b) Webserver
c). Database
 
Q:-8 What is the default port for the Secure Web server ?
a) 80
b) 8080
c) 443
d) None of Them
Q:-9 OpenStack  is  a __________
a) Cloud computing software / OS
b) Mac Operating system
c) Windows Operating System
d) None of them 

 ***Answers 1-d , 2-a , 3-a , 4-a , 5-b , 6-a , 7-c, 8-c , 9-a.***

** Please feel free to add any other comments or ideas you may have. You're invited to share your thoughts.**






Popular Posts

Please don’t copy any content!