Conount-blogger tips,Marketing, Web Design, Computer Hardware and Network, Business and Finance.

Blogger

[blogger][recentbylabel]

Business & Finance

[Business & Finance][recentbylabel]

Marketing

[Marketing][recentbylabel]

Web Design

[Web Design][recentbylabel]

Technology

[Technology][recentbylabel]

How to Protect Your Folder


Using this method You Can Hide your Files in One Minute basically we use cmd to hide our file. if someone clicks the show hidden tick don't worry it's not working for this method 

Kindly follow the below video instruction.

cls
@ECHO OFF

title Conount Folder Locker

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK

if NOT EXIST secured goto MDLOCKER

:CONFIRM

echo Are you sure u want to Lock the secured(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM

:LOCK

ren secured "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

attrib +h +s +r +i "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

echo secured locked

goto End

:UNLOCK

echo put in the key to Unlock the lock

set/p "pass=>Password="

if NOT %pass%==Your Password goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" secured

echo secured Unlocked

goto End

:FAIL

echo Invalid keyword

goto UNLOCK

:MDLOCKER

md Secured

echo lock unlocked

goto End

:End


Video tutorial 

what is the simplest way of embedding another web page in php

what is the simplest way of embedding another web page in php

Today  we are going to talk about what is the simplest way of embedding another web page in php  basically  we use "div  " tag to embedding however in this methods you can fully customize  your Embed part which mean you can embed select Ares of another web page . Let's See How to do that ...


First  copy below code into your page.  


<div style="margin-left: -250px; margin-top: 50px; overflow: hidden;">
<iframe scrolling="no" src="url" style="border: 0px none; height: 900px; margin-bottom: -50px; margin-left: -240px; margin-top: -100px; width: 2000px;">
</iframe>
</div>

Then replace the "url"  to embed web page link .

<div style="margin-left: -250px; margin-top: 50px; overflow: hidden;">
<iframe scrolling="no" src="url" style="border: 0px none; height: 900px; margin-bottom: -50px; margin-left: -240px; margin-top: -100px; width: 2000px;">
</iframe>
</div>

 

Now you can adjust margins with your creation



Top 11 CMD Commands




1.ASSOC: Fix File Associations

One of the most powerful tools in the CMD command library is the ASSOC command.
Your computer associates certain file extensions with certain programs. This is how your computer knows to open Adobe when you double click a PDF file, or Microsoft Word when you double click a DOC file.
You can view all the file associations your computer knows about by typing ASSOC in the command window. You’ll see the file extension and the program it’s associated with.
You can set the association by typing something like assoc .doc=Word.Document.8


2. FC: File Compare

Sometimes when files are changed over time, it’s hard to remember what the differences were between versions. You may not know that a CMD command offers the ability to compare files and see all differences, but it’s true.
The FC command performs either an ascii or a binary file comparison and will list all of the differences that it finds.

Fc /a File1.txt File2.txt will compare two ascii files.
Fc /b Picture1.jpg Picture2.jpg will do a binary compare on two images.

3. IPCONFIG: IP Configuration

Network troubleshooting is never simple, but one command that makes it much easier is IPCONFIG.
Using this command in the CMD command prompt returns detailed information about your current network adapter connection including:
  • Current IP Address
  • Subnet Mask
  • Default Gateway IP
  • Current domain
This information can help you troubleshoot router issues and other connection issues you could be having with your network adapter.


4. NETSTAT: Network Statistics

Concerned that you could have malware running on your computer that’s connecting to internet locations without you knowing about it?
If you run a NETSTAT command in the command prompt, you can get a list of all active TCP connections from your computer.

5. PING: Send Test Packets

An IT Analyst’s best friend is the PING command.  Running this command sends test packets over the network to the target system.

You can use the PING command to test whether your computer can access another computer, a server, or even a website. It can help with revealing network disconnections. It also provides transit time for the packets in milliseconds, so it also reveals a bad network connection as well.


6. TRACERT: Trace Route

TRACERT is a fascinating Windows Command to use. If you’re ever curious to see the path your internet traffic takes to get from your browser to a remote system like Google servers, you can use TRACERT to see it.

The command stands for “Trace Route”, which sends packets out to a remote destination (server or website), and provides you with all of the following information: 

  • Number of hops (intermediate servers) before getting to the destination
  • Time it takes to get to each hop
  • The IP and sometimes the name of each hop

TRACERT can reveal how the routes of your internet requests change depending where you’re accessing the web. It also helps with troubleshooting a router or switch on a local network that may be problematic.


7. SYSTEMINFO: System Information

If you need to know what brand of network card you have, processor details, or the exact version of your Windows OS, the SYSTEMINFO command can help.
This command polls your system and pulls the most important information about your system. It lists the information in a clean format that’s easy to read.

8. SFC: System File Checker

If you’re ever concerned that a virus or some other software might have corrupted your core system files, there’s a Windows command that can scan those files and ensure their integrity.

You need to launch CMD as administrator (right-click and choose Run as Administrator). Typing SFC /SCANNOW will check the integrity of all protected system files. If a problem is found, the files will be repaired with backed-up system files.

The SFC command also lets you:

/VERIFYONLY: Check the integrity but don’t repair the files.
/SCANFILE: Scan the integrity of specific files and fix if corrupted.
/VERIFYFILE: Verify the integrity of specific files but don’t repair them.
/OFFBOOTDIR: Use this to do repairs on an offline boot directory.
/OFFWINDIR: Use this to do repairs on an offline Windows directory.
/OFFLOGFILE: Specify a path to save a log file with scan results.

The scan can take up to 10 or 15 minutes, so give it time

9. CHKDSK: Check Disk

While the SFC command only checks the integrity of core system files, you can use the CHKDSK command to scan an entire drive.

The command to check the C: drive and repair any problems, launch the command window as an administrator and type CHKDSK /f C:.

This command checks for things like:
  • File fragmentation
  • Disk errors
  • Bad sectors
The command can fix any disk errors (if possible). When the command is finished, you’ll see a status of the scan and what actions were taken.


10. SCHTASKS: Schedule Tasks

Windows comes with a wizard for creating scheduled tasks. For example, maybe you have a BAT file stored on C:\temp that you want to run every day at noon.

You’d have to click through the Scheduled Task wizard to configure this. Or you can type a single SCHTASKS command to set it up.

SCHTASKS /Create /SC HOURLY /MO 12 /TR Example /TN c:\temp\File1.bat

The scheduled switch accepts arguments like minute, hourly, daily, and monthly. Then you specify the frequency with the /MO command.

If you typed the command correctly, you’ll see the response, SUCCESS: The scheduled task “Example” has successfully been created.

11. ATTRIB: Change File Attributes

In Windows, you can change file attributes by right-clicking on a file and finding the right property to change. However, instead of hunting around for the file attribute, you can use the ATTRIB command to set the file attributes.

For example, if you type: ATTRIB +R +H C:\temp\File1.bat, it’ll set File1.bat as a hidden, read-only file.

There is no response when it’s successful, so unless you see an error message, the command worked.

Other Windows CMD Commands

As you can see, there are some powerful and useful things you can do with the Windows command prompt, if you know the right commands.

Believe it or not, there are even more commands that will give you the ability to do some things you probably never realized just by typing a simple command.

  • BITSADMIN: Initiate upload or download jobs over the network or internet and monitor the current state of those file transfers.
  • COLOR: Change the background color of the command prompt window.
  • COMP: Compare the contents of any two files to see the differences.
  • FIND/FINDSTR: Search for strings inside of any ASCII files.
  • PROMPT: Change the command prompt from C:\> to something else.
  • TITLE: Change the title of the command prompt window.
  • REGEDIT: Edit keys in the Windows registry (use with caution).
  • ROBOCOPY: A powerful file copy utility built right into Windows.

Is WhatsApp Safe?






                       WhatsApp


WhatsApp is a popular free social networking mobile app that allows users to create an account, send messages, photos and video, and keep in touch with friends, family and colleagues.


1) How to configure privacy settings on WhatsApp?












Once you go to WhatsApp, tap on the Menu button displayed at the top right corner and then select icon just after the search bar.

Go to Settings → Account→ Privacy

Then you can set the following options separately for last seen, profile photo about (personal information) and status

Everyone

Your last seen profile photo and/or status will be available to all WhatsApp users.

My Contacts

Your last seen profile photo and/or status will be available only to your contacts from your address book.

Nobody

Your last seen profile photo and/or status will not be available to anyone.

                   

    

2) How to configure security settings on WhatsApp?









  • WhatsApp has performed a magnificent feat in bringing end-to-end encryption for all communications
  • Make sure that WhatsApp has access to your camera. You may have already allowed this when you install WhatsApp.
  • Open a conversation with your friend in WhatsApp and then select the person’s name at the top of the conversation.
  • This will open the contact window for that person. Near the bottom of that screen, you will see a setting for Encryption.
  • Tap on the encryption field, and you will view a screen that displays a QR code as well as a 60-digit decimal code that represents the contents of that QR code.
  • At the bottom of the QR code screen, there is a link that will enable you to scan your friend’s code, and they can do the same for your code. 



3) How to configure two-step verification settings on WhatsApp?

              








1.  Once you go to WhatsApp, tap on the Menu button displayed at the top right corner and then select the drop down icon just after the search bar.

2.  Then select, Settings  Account → Two-step verification → Enable

3.  Once you do that, the app will ask you to provide an email and set a six-digit passcode.

4.  On next screen, enter your email ID (optional) to enable pass code recovery via email. (It's recommended to use email as a backup so that you're not locked out of your account if you forget your passcode.) Then tap “Done”.

5.   Next time when you reconfigure your WhatsApp account on your new phone or want to add a new phone number to your account, the messaging app will require you to enter and confirm this six-digit secret code.

6.  Importantly, two-step verification can be disabled within the app without a passcode so your account could still be compromised if your phone falls into the wrong hands. But the update should help lock things down in case someone tries to hijack it from afar.



4) How to change the number on the WhatsApp account?












1.   Make sure your new “phone number “can receive SMS and/or calls and has an active data connection before changing the number.

2.  Make sure your “old phone number “is currently verified in WhatsApp on your phone. You can see what number is verified in WhatsApp by navigating to WhatsApp Settings and tapping on your profile photo before changing the number.

3.  Once you go to WhatsApp, tap on the Menu button displayed at the top right corner and then select dropdown icon just after the search bar.

4.  Then select, Settings Account Change Number.

5.  Enter your current WhatsApp phone number in the first text box. Enter your new phone number in the second text box. Then tap “Done” to continue

6.   If you Change Number, as long as you continue using the same phone your chat history will be available on your phone with the new phone number.



How to delete the WhatsApp account?








1. Removal of all the information in your chats and media files in WhatsApp is however not a permanent process. It does not guarantee permanent deletion of all data in such a way that they are unrecoverable.

2.  Check all the information in the ‘WhatsApp' and ‘WhatsApp Attachment' before you start deleting your account. This will help in permanently erasing all the data, and. This will ensure that no privacy leak happens when you delete the account.

3. Once you go to WhatsApp, tap on the Menu button displayed at the top right corner and then select dropdown icon just after the search bar.

4. Then select, Settings Account Delete my account.

5. A text box will appear on the screen, enter the complete phone number of your device including the international code.

6. Now tap on, “Delete my Account”.


Things you should know when deleting the WhatsApp account !

·   When you have completed the WhatsApp account deletion, contacting you via your WhatsApp account will not be possible. If you were part of your friends' list of favourite persons to contact, your detail and name would not appear any more.

·   All the conversation, messages and chats will be erased from your device and you will be unable to access such information. If WhatsApp is synchronized the data can be recovered.


·  You name as well as the number will not be part of the WhatsApp groups you belonged to earlier. 


How To Track Unknown Phone Numbers 100%



Smartphone market had taken the willing path to reach the top of all requirements. By looking at these facts, one is bound to receive hundreds of spam or telemarketing calls. Let’s admit, the unknown numbers and private calls were the worst types of anxiety that we face on a daily basis.

Many of restricted or unidentified numbers call come from telemarketers trying to sell products. These are usually spam calls, but it can invite lots of financial and mental troubles to us. So, to deal with spam calls, Conount has decided to share a few best tips to recognize and block spam/unknown calls.



True Caller (Desktop Version)



Ths web app uses massive number database to identify callers. Truecaller is a Swedish company which has over 85 million users. It works with a database of millions of previously identified numbers. The program also searches on the internet to gather other information related to the caller.

Step 1 
  First of all, go to the Truecaller official website with your PC.



Step 2
Select your country from the drop-down if you are from Sri Lanka then the default option will be “Sri Lanka (+94) enter the phone number that you want to search and then click on search.



Step 3 

Now it will ask you to sign up with a true caller to know the details of your searched mobile number. If you have a Gmail or Microsoft account then you can connect with Truecaller.




Step 4 
After the sign up completed successfully you will be given the complete details of your searched number. And the information is completely true and 90% accurate.




2. Using True Caller on Android

You can get benefitted from Truecaller if you have an Android smartphone. To make the most use of this fantastic product, you need to install the Truecaller app on your Android smartphone.



Step 1 
    Download True Caller App from play store.



Step 2 
   Click "Get started " button. 





Step 3 
   If you like to set Default true caller app Click "Set" if not click Cancel. 



Step 4 
    Click Continue




Step 5 
   Click Allow button.



Step 6 
   Type your Mobile Number and Click. Continue. 



Step 7 
   Click  "Agree & Continue". 



Step 8 
    then there is a litter bit verification system like Viber 



Step 9 
   Click the  "Google"  Button


Step 10 
    All Done.!




TrueCaller Alternatives For Android

there are some other Android apps available on the Google Play Store that allows users to identify the numbers and blocks the spam calls.


1 ) Whoscall


It is one of the best and leading Truecaller alternatives app that’s available for both Android and iOS. The great thing about Whoscall is that it has been downloaded over 70 million times and it has own offline database to identify calls. Whoscall also blocks spam calls automatically.

1 ) Showcaller

It is another best TrueCaller alternatives on the list which specialized in identifying caller ID and region. Not just that, but Showcaller can also identify spam calls, telemarketing calls. The app is now used by millions of users and it requires less than 10MB to install on your Android smartphone.






Best code editor for PHP - Code Lite





a few days back I started a new PHP Project call "order now " so before starting my project I did a reached about what is the best code editor for my project. it takes a few days .i like to share my experience with you. ok, let's dig in.!!!!!!! 


Code lite is the best solution for my project .it has very charming features. withing these features I can recommend to everyone use this .let's see what are the feature that code lite has?


1) it's free 




You can download it without pay any single dollar with so many features. (to download Code lite Click the Download Button).

2) no need  Supper Computer


most code editors need high hardware spec to work. but code lite need minimum hardware spec.

3) A good teacher


code lite has a good feature. it shows full details and errors about the PHP code. I think it's a big opportunity for beginners.

4) Simple Interface with simple installation


code lite has a very simple interface so no need rocket science knowledge to manage and installed code lite. 


                                                  Download Buttons transparent PNG images - StickPNG

Find Us on Instagram

Featured

[Featured][recentbylabel2]

Featured

[Featured][recentbylabel2]
Message From Conount
If you fell down yesterday, stand up today.
Ok