ZenTek: December 2014
Contact Us:

If You Have Any Problem, Wanna Help, Wanna Write Guest Post, Find Any Error Or Want To Give Us Feedback, Just Feel Free To Contact Us. We Will Reply You Soon.

Name: *

Email: *

Message: *


LiveZilla Live Help

Enable Command Prompt Disabled by Administrator or Virus

Command Prompt is the tool in Windows which allows users to interact with their computer from a character user interface(CUI). It allows users to bypass most restrictions that are enforced on the Windows explorer based GUI. Hence, it can also be used to remove viruses and malware and also undo their effects. To avoid this, most viruses disable command prompt. Some administrators also purposefully disable it to avoid users changing critical settings of the computer.

In these situations, if you run the command prompt (cmd.exe), you will get an error saying "The command prompt has been disabled by your Administrator". However, there are ways in which you can re-enable it. This article contains some such few simple techniques using which you can easily enable the command prompt.

Enable Command Prompt

Enable Command Prompt using the Group Policy Editor

1) Click on Start. Go to Run. Users running Windows 8, Windows 7 or Vista, go to Search.

2) Type gpedit.msc and press Enter.

3) Navigate to User Configuration/ Administrative Templates / System.

4) In the work area on the right side, double click on "Prevent access to the command prompt".

5) In the popup dialog, encircle Disabled and click OK.

6) You should be able to immediately use the command prompt. If you still cannot access it, restart your computer.

Home editions of Windows do not contain the Group Policy Editor.

Enable Command Prompt from Registry in Windows 8, 7, XP or Vista

Registry Editor is an in-built tool in Windows which is used to view and edit the Windows registry. You can use it to easily enable the command prompt by simply modifying a registry key. To do so, follow these steps.

1) Users running Windows 8, Windows 7 and Windows Vista, go to Start>Search. Users of Windows XP, got to Start>Run.

2) Type regedit and press Enter.

3) Registry Editor will start. If it is disabled, you will need to enable Registry Editor first.

4) Navigate to HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System. If the Windows key is not there, you will need to create a new key called Windows. Also, if the System key is not there, you will need to create it.

5) In the work area on right side, double click on DisableCMD and set its value to 0. If you cannot locate DisableCMD, you will need to create a new DWORD value called DisableCMD and set its value to 0.

6) Close the Registry Editor.

Enable CMD
The Command Prompt in Windows 8

The command prompt should immediately be accessible. If it isn't, restart your computer.

Enable Command Prompt by simply running a command

If you are unfamiliar with directly editing the Registry, you can use a simple command to quickly enable the command prompt. Just follow these steps:-

1) Click on Start and go to Run. Users of Windows 8.1, Windows 8, Windows 7 and Windows Vista, go to Search.

2) Copy and paste the following command and execute it.

REG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f
3) This should enable the command prompt. If it is still not enabled, restart your computer.

The methods mentioned in this article work on Windows 8.1, Windows 8, Windows 7, Windows Vista and Windows XP.

Posted By: Akash

Folder Protector: How the program works

Some time ago, I released a folder locking application on this blog. It has been downloaded by a lot of users till now. Many of them are curious about how the program works and regularly send me emails inquiring about this. This article will explain exactly what the program does and how it locks folders.

Folder Protector
The application is fairly basic because of the limitations of the programming language. Also, as most of you might have already guessed, it does not encrypt the files which explains quick locking and unlocking time.

What happens when you start the program?

When you start the program, it first checks whether a password is stored in the Registry. If it finds that a password is not saved in the registry, it asks you for a password and stores it at: HKCU\Software\TweakAndTrick\FolderLock\Pass. This, I intend to change in the future because storing the password in the registry defies the purpose of giving security.

What happens when you lock and unlock folders?

The program checks the presence of SecuredFILES folder on the Desktop to determine whether the folder is locked or unlocked. Depending on what it finds, it shows you the status. Now, here is what it does when you lock and unlock the folders.

When you lock the folder, it renames the SecuredFILES folder to Control Panel.{ED7BA470-8E54-465E-825C-99712043E01C} in Windows Vista, 7, 8 and 8.1. In Windows XP, it renames the folder to Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}. These folders use the Control Panel's GUID, so when a user clicks on them, the Control Panel opens. This prevents the average user from knowing that it is a renamed folder.

I could have left these folders at the Desktop itself but that would make them susceptible to getting deleted or being found out by any tech geek.

To prevent this, I decided to move these renamed folders. They are moved to %AppData%\Microsoft which is located at C:\Users\{User-Name}\AppData\Microsoft\ in latest versions of Windows (if C is your system drive). In Windows XP, it is located at C:\Documents and Settings\{User-Name}\Application Data\Microsoft\ .

I chose the Microsoft folder because that is where the Control Panel fits perfectly.

To prevent the renamed folder from getting deleted, the program changes the permissions on the renamed folder. As you can see, the program basically obscures your data from you in an attempt to hide files.

When you unlock the folder, the reverse process takes place and the SecuredFILES folder is displayed on the Desktop.

Why am I revealing this?

There are a lot of reasons. Primarily, most users have started to use this program to hide their sensitive information which is not what I had in mind when I released the software. Although, even the most well crafted security systems can be breached by hackers, I still don't want people to hide their really sensitive information with this software especially considering that one of the primary focus of this blog is giving tips on security.

Another prominent reason is that providing support to such a large user base is proving difficult. Also, some users are reporting that the program is not unlocking the folder despite entering the correct password (which should not happen given how simple the code is).

What next?

I have modified the original post to indicate that the software should not be used to hide very sensitive data. Also, given that I have revealed how the program works, the best way to use it will be to delete the program after locking the folder and then re-downloading it when you want to unlock your files, i.e, not letting other people know that you use the program.

If you have some suggestions or want to help develop a truly secure folder locking program, do add a comment.

Posted By: Akash

How to Secure a Wireless Wi-Fi Network

With the world going wireless in every sphere of technology, the question of security has often been raised. The same is true for wireless internet networks or Wi-Fi networks with hackers and Wi-Fi intruders always looking for ways to gain access to unsecured networks. There are several reasons why you might want to protect your Wi-Fi network. Prominent among them include better privacy, reduced internet bills and faster internet speeds.This post contains few simple techniques you can use to make sure that your wireless network is as secure as it possible can be.

Protect your Wireless Internet Network

1) Encrypt your Wi-Fi Network: When you use a Wi-Fi network for accessing the internet, every piece of data you send and receive over the air can be easily snooped by anyone with the right set of tools. Packet sniffers can be used by even the most novice of users to sniff your data. This means that a hacker can not only see which websites are you accessing but also get the login details of your personal and professional accounts.

Posted By: Akash

How To Convert any Video to ASCII using VLC Media Player

VLC is a video player with a lot of tricks. While you definitely would be aware about converting videos with it, the feature of converting any video to ASCII is one that is slightly less known. As ASCII version of movies like Star wars are very popular online, I think this feature of this amazing media player can be used to have lots of fun.

An example of a video in ASCII form

All you need to do is open any video and VLC will automatically display its converted form. To convert any video in ASCII, just follow the steps given below:-

Posted By: Akash

How To Enable the Hidden Administrator Account on Windows 7, 8 & 8.1

Windows automatically creates an Administrator account with elevated privileges during the installation process. We mostly need to access it to perform tasks limited only to system Administrators. These are tasks performing which result in the UAC asking for confirmation even if you are using an account with administrative privileges. The elevated Administrator account is disabled by default in Windows 7, Windows 8, Windows 8.1 and Windows Vista.

To activate it, you need to use any one of the the following simple methods.

Important: It is recommended to only use this account for troubleshooting purposes and disable it once the task is complete. Even if you do leave it enabled, protect it with a strong password to prevent unauthorized access.

Posted By: Akash

The Guide to Geocaching Completely Offline with Android [Offline Map]

Welcome back! You may be asking yourself, "Why on earth would I need to cache offline with my Android smartphone? I have enough data that I don't need to worry about it." Well, I'll tell you. In fact, I can list several reasons offline caching may make sense to you.

2013-09-26 23.10.01

c:geo - a free geocaching app for Android
Back in 2012, my family was invited to spend Thanksgiving with some extended family in upstate New York. It was a great area, but so remote that it was about 30 minutes of driving PAST where we lost cell phone coverage. This wasn't a problem, though, because I was prepared with oodles of caches to find, stored in my phone. (And yes, I did have my Garmin Oregon 450 for backup. I love that thing, but there are some things that are easier to do on my phone.)

So caching we went. Ladyiredhat and I took my uncle and cousins to some local caches. (Side note: Ladyiredhat had an Android phone, too, but wasn't set up for heavy offline caching at that point. I was able to transfer the cache list and offline maps from my phone to hers using Bluetooth, but that is covered in our advanced class.)

You may find yourself in several scenarios in which you could benefit from offline caching on your phone:

  1. You have a limited data plan, especially if it is towards the end of the month and you tend to go over your limit.
  2. You are going to be someplace where cell coverage may not…err…cover. This seems to be more common where hiking is more prevalent.
  3. You like the organization of having everything laid out and planned before you go caching.
  4. You want to use your smartphone for keeping track of your finds in the field, but want to write more detailed logs at home later.
If any of these, or other, reasons seem to apply to you, then you may be in luck. You only need a few things:

  1. An Android-based smartphone with a GPS chip and some space (hopefully you picked up on this from the title of this article)
  2. The geocaching app c:geo - free on the Google Play store
  3. Offline OpenStreetMaps for your region (state, country, etc., more on this later)
  4. Optional: the send2cgeo plugin, free from the developers of c:geo (Note: this only works with Chrome and Firefox web browsers)

Getting Set Up

You're still with us? Great! We have a little bit of prep work before you're ready to head off and cache disconnected from the cellular infrastructure. If you haven't already, head over to Google Play and install c:geo. After it is installed, you will want to go into the settings (press the menu button from the main c:geo screen, then press "Settings") and configure a few things, especially your Geocaching.com username and password. You might want to check the Units of Measurement while you're here…I forget sometimes and end up not realizing I'm in meters instead of feet.

Next, get your offline OpenStreetMaps. Browse to your continent, country, and state or province, if applicable. You may choose to get multiple areas you cache in. For example, I cache in Pennsylvania and New Jersey regularly, and also Deleware, Maryland, and New York occasionally, so I grabbed all five of them. Each state ranges in size, depending on the land area of the state, so those of you in Texas and California have a little bulkier download at 100+ MBs.


Select your state or country from OpenStreetMaps
Each state will me a .map file named for the state, e.g., "pennsylvania.map". Copy these files to the /.cgeo/ folder on the SD card in your phone. c:geo should create this folder for you when you run it, so if you don't see it, check the internal storage. Now, when you go to the map view in c:geo and press the Menu button, you will have choices for "State name: (Offline)" for each state you stored as an offline file. If you also use mapping app Locus, you may wish to store your maps in the /Locus/mapsVector/ folder instead, then tell c:geo to look in that folder so the maps will be available to both programs and only stored once. This setting is in c:geo under Settings –> Map.


You can select a folder other than the default /.cgeo/
The next step is optional, but great to have especially for urban and suburban caches (but less helpful in forests, though.) You will probably want to enable Static Maps. Static maps are just that – static snap shots of Google maps zoomed to the closest two levels in (satellite view) then the next four levels out (map view.) These are very helpful to see what landmarks might be near, and how to get to the cache. They don't use any data, once downloaded, though they do take up some space on your phone. Turn this on in c:geo under Settings –> Offline Data. Static Maps (WP) will also store static maps for any waypoints available on the cache listing (parking, trailheads, etc.)


Enabling Static Maps
Let's Get Some Caches Up In Here!

Wait, you got maps, what more do you need? Oh, right, geocaches. Yeah, let's take care of that. There are a few ways to get geocaches from geocaching.com into c:geo.

Method 1 (premium members only):

  1. Run a pocket query (PQ) with the caches you wish to store
  2. Extract the PQ zip file to /GPX/ on your SD card
  3. In c:geo, go to the Stored caches list of your choice
  4. Go to Menu -> Import GPX
This will take a while, but you'll end up with all of those caches in your c:geo list. Note that PQs only contain the last 5 logs, so only the last 5 will show up in c:geo using this method.

Method 2:

In c:geo, search by GC code one at a time. This gets all past logs in, but obviously is very tedious and slow. c:geo also has the ability to add caches by QR code, but it requires a barcode scanner to be installed on the phone and a QR extension for geocaching.com to be installed in your browser, so I am not going to cover it here.

Method 3:

My preferred way is send2cgeo because after setting it up, it is the easiest and fastest. It takes minimal setup, and saves TONS of time.

  1. First, head over to send2.cgeo.org. You will need to either use Google Chrome or use Mozilla Firefox with the free Greasemonkey extension installed.
  2. Go to the script install page and click the "Start greasemonkey script installation!" link (even if you are using Chrome.)
  3. Next, on your phone, go to Settings by hitting the Menu button and touching Settings.
  4. In Settings, under Services –> Send to c:geo press Request Registration.
  5. Your phone will give you a PIN number you will need to enter on the send2cgeo website when you click the "Add a device …" link at the bottom right of the page.

Your phone and browser will now be connected. (Note that if you get a new phone, a new computer, or clear out the cookies in your browser, you will need to repeat the send2cgeo process from the above paragraph.) Now, when you are browsing geocaching.com, you will see "Send to c:geo" buttons in several places, such as the top of cache listing pages (near the Send to My GPS button), on the popup box showing caches in the map view, and a few other places.

  1. Now, on your phone, start up c:geo, open your cache list from Stored Caches, press Menu and Import from Web. Over the next few minutes (depending how many caches you sent), the cache listings, logs, waypoints, notes, and static satellite maps for caches you have "Sent to c:geo" will be stored on your phone.

At this point, you can go completely off the grid and start caching completely offline! All the maps, including the maps for driving and getting TO Ground Zero, and the satellite maps for seeing landmarks and precisely where the cache is located, are stored on your phone, along with the cache description, hints, personal notes, waypoints, all logs, and trackable information. Whew!

Getting Your Finds Back to Geocaching.com

So you have a phone, dozens of offline caches and maps, and a whole big area to explore and in which you can find geocaches…but now what? As you find each geocache, you can record your progress so you don't have to remember it all later. If you are on the cache listing in c:geo, hit Menu, then Log Visit offline and select Found it, Didn't find it, Write note, etc. as appropriate. If you go to the bottom and touch Log Visit, you will go to a screen where you can also enter textual notes that will show up later (e.g., dropped travel bug, log was wet, etc.) I usually use just the Found it (or Didn't find it) buttons except where I want to remind myself to include something in my found it log.


Long-press the cache on a list, or Menu from the cache listing,
then select Manage and Log Visit Offline

Next, select the offline log type to record
(hopefully a "Found it" log!)
c:geo is great about keeping track of exactly when you logged each offline visit, so later they show up in the exact order you found them. For some people, this may not matter, for others, logging a cache out of order could mean life or death! (or at least feel like it.) Each cache listing that has an offline log in c:geo will have an orange bar next to the cache listing in lists, and will have a little orange face for that cache in the map view (happy or sad, depending on the log type.)

Posted By: Akash

7 Things About Android Lollipop 5.0 You Need To Know

After offering chocolate (Kit-Kat), now Google is ready to serve
you Lollipops. Google on Wednesday finally revealed the official name of
its next version Android L — Android 5.0 Lollipop.


The newly released Android 5.0 Lollipop ships with the latest
Motorola-made Nexus 6 smartphone and Nexus 9 tablet built by HTC, but
the company did not make the Lollipop available for download to other
users immediately. The older versions of Nexus devices will receive the
Lollipop update in the coming weeks.


Posted By: Akash

How To Find Facebook Email Address Legally When It Is Hidden?

At some point or another, you will find yourself looking for a Facebook user's email address. In the past, you can look up for the email address of any Facebook contact by simply going to his or her profile's "About" tab. Today, due to Facebook's privacy updates, majority of the user's email address are replaced with a Facebook email address. When people send you an email using this Facebook email address, their message would not go to the email account you signed up with but rather on your Facebook inbox. In several cases, the message will be sent to the "Other" folder.

Posted By: Akash

5 Essential cPanel Settings for Beginners

cPanel is the leader and industry standard of standalone hosting platform nowadays. The main product WHM/cPanel has been used by most web-hosting providers due to its flexibility, and because it’s easy to manage,customizable and backed by great quality support.

Most of us who are involved in the web-hosting industry have heard of what it can do.If you are new to cPanel however, there are a few things that we would recommend that you do during the intial phase. Listed after the jump are 5 recommended initial setups for new cPanel users.

Posted By: Akash

How to Use 2 Whatsapp Account On Single Android Device

Requirements: Android 2.1+
OGWhatsApp is a modded version of WhatsApp for Android that always you to use 2 numbers of WhatsApp in one device Without “Root” and they works in one time
Download : Click Here
  • You can use 2 numbers in one device
  • You can take a Backup of Data & restore it
  • You can choose the app icon

    And more
Ads remove!!

Posted By: Akash

Contact Us


Email *

Message *


About Me

Hello Guys

I am an IT(Information Technology) Student design this blog for your Preference I always enjoyed technical things as a kid

now here i am sharing my knowledge about Tips and Tricks In Internet PC Windows Free Recharges and Other Cool Stuffs Too

So enjoy it


Widget by : ZenTek
Widget by : ZenTek
Copyright © . ZenTek. All Rights Reserved.
Designed by :-Way2themes