Welcome, 2zone & company-We are registered computer resellers, software developer, computer technicians, Advertisements & event orgernizers and all ICT consultations.

.........We are here to serve.

Monday, 21. May 2012 - 17:45 Uhr

How to recover your Hidden files and folder from your Flash disk (Pendrive)

 

How to recover your Lost/ hidden Files from your storage Drives

 

Its very common to encounter this problem. Solving it is as easy as to encounter it too. If your pendrive/ flash disk or any other storage device shows hidden files and folders or shortcuts then you have every reason to panic if you you have very serious information in your device.

 

So what really happens.

 

The virus is dependent upon the autorun system of the computer to duplicate and infect targeted areas, since portable pendrives are the easy way of hardware sharing between one computer to the other, it makes them very vulnerable to virus infections.

 

Once you insert an infected pendrive Your Antivus programs have the capability to block the autorun file as the device is inserted. This prevents the virus from running and infecting other files within your computer.

 A Virus is indeed smart, smart to the extent of setting a backup plan incase its blocked by the antivirus through autorun. The virus then replicates your files and hides your original files replacing them with a shortcut - not to your files but to the virus itself.

This action serves as it’s backup plan encase the autorun system fails.  The original files are not damaged, only the attributes had been changed.

 

Understanding that only the attribute is changed then the solution is to reverse the process. And here is how.

  • Insert your drive and note its name (say H:, I:, G: etc)
  • Open the Command Prompt (easy way to do this: from start, type cmd, then click enter)
  • Once the Black and white interface (cmd) start, type the name of the drive followed by :

Eg. H:       then enter.

  • Type   attrib –s –h –r /s /d  (remember, there is a space between (attrib)and (-s) and(-h) and(-r) etc)
  • Then ENTER

CHECK YOUR DEVICE!

Further more we recommend usage of a good antivirus and we recommend KASPERSKY. Get it by clicking HERE

 

For more Technical support Contact Us:

2zone Technical Unity

Mobile: +255719792703

Email: sales.2zone.page4.me




Tags: shortcuts hidden files antivirus virus 

1782 Views

1 Comment

Monday, 21. May 2012 - 11:21 Uhr

Twitter classic phishing scam DM

Some of you (infact many) have been receiving DM from your friends or other tweeter accounts saying "

 ‘Someone’s Saying Bad Things About You’

Well here is the story behind:

Hackers have managed to use fake tweeter ID which can spread faster (those having many followers or of big corporations) and send Direct Messages to followers saying someone is saying very bad things about you, or someone is saying very nasty things about you or someone is saying horrible  things about you etc.

 

Then to see the so called "bad/ horrible/ nasty" thing that are being said about you you have to click on a link that is attached with the mail.

 

By the time you follow that link, it takes you to a fake twitter log in Page (you can not recognise if its a fake, looks identical) and you are required to log in as your session is expired already.

 

Your Log in details are then collected this  information will pass on to hackers and your account gets compromised. After this, the hackers can misuse this twitter account to send more such provoking direct messages to more people and it starts to spread. 

Now what happen after they have all your web adresses,?

you may see this as a very simple issue but for a company sending very sensitive information through the emails that they use on their social networks, Just image,the thousands of business email addresses hackers could forward their target website addresses or viruses.

This onlineespionage crippled companies and cost them millions of dollars in lost revenue and worker hours 

Also, hacker may try and succeed  to infect your computer with a virus 


What to Do

 

If you get such message via email or Direct message on Twitter, do not click the link in this DM. Manually type twitter.com in the address bar of a browser and login to your twitter.

Click on messages, select thephishing message and click delete link at the bottom of the message,

then make sure you change your password atleast once after you have done the above process.


2zone Computers provide consultancy on  email management service for compromised corporate email addresses and Antivirus softwares that can minimize this threats, Value your confidentiality, Data and internet experience.

Contact us:

 

Mobile: +255 719 792 703

Email: sales.2zone@gmail.com


Tags: twitter scams phising 

1119 Views

0 Comments