CALL US

+91 8219776763

Category: Windows

Protect Your Google Chrome Browser With Password

By Prempal Singh 0 Comment October 28, 2016

The technique is very simple and easy as functions with a simple Google chrome extension with their security and through this, everyone can make their browser with the security password, with any of password you want to set. By this, you can promise your personal privacy and share your computer with anyone else too. Since you […]

How to send Self-Destructive Messages, email

By Prempal Singh 0 Comment October 24, 2016

If you want to get fun with your friends outwardly a proof that you have sent the meaning, then you can use this way message will automatically delete from the computer or mobile to which you are sending the message. Through this method, you can simply make fun with your friends. The method is very simple […]

How to detect USB 2.0 and 3.0 in Windows

By Prempal Singh 0 Comment October 19, 2016

If your computer system have 4 or 5 USB ports, then how to detect, which USB port is 2.0 or 3.0. Basically 3.0 USB port is using for Super Speed for transfer files. This article will definitely help you to detect different USB ports. Difference between USB 2.0 and 3.0 Released April 2000 November 2008 Speed […]

How to make bootable pendrive in 3 Steps

By Prempal Singh 0 Comment September 14, 2016

Although there are many ways to make bootable pen drive, but today I wanna share you a simple way to make bootable pen drive for all Operating Systems. Requirements:  USB Drive at least 4 GB or above Universal USB Installer Windows Operating System Operating System ISO File Step 1: Open Universal USB Installer, click on I […]

How to install Nmap on Linux & Windows

By Prempal Singh 0 Comment September 10, 2016

What is Nmap Nmap is stands for Network Mapper, which is open source, used for find network and auditing for security. Network administrator are used for monitoring host or service up time, network inventory, managing service and upgrade networking schedules. Nmap also use raw IP packets are many ways to identify which hosts are available […]

error: Content is protected by Cyberops !!