Latest blog posts
- ►▼ 2013 (2)
- ►▼ 2012 (6)
- ►▼ 02.07 - 08.07 (1)
- ►▼ 21.05 - 27.05 (2)
- ►▼ 23.04 - 29.04 (1)
- ►▼ 02.04 - 08.04 (1)
- ►▼ 05.03 - 11.03 (1)
- ►▼ 2011 (17)
- ►▼ 26.12 - 01.01 (1)
- ►▼ 12.12 - 18.12 (1)
- ►▼ 28.11 - 04.12 (1)
- ►▼ 14.11 - 20.11 (1)
- ►▼ 24.10 - 30.10 (1)
- ►▼ 03.10 - 09.10 (1)
- ►▼ 05.09 - 11.09 (1)
- ►▼ 11.07 - 17.07 (1)
- ►▼ 04.07 - 10.07 (2)
- ►▼ 13.06 - 19.06 (2)
- ►▼ 09.05 - 15.05 (1)
- ►▼ 02.05 - 08.05 (1)
- ►▼ 25.04 - 01.05 (3)
Monday, 21. May 2012 - 17:45 Uhr
How to recover your Lost/ hidden Files from your storage Drives
Its very common to encounter this problem. Solving it is as easy as to encounter it too. If your pendrive/ flash disk or any other storage device shows hidden files and folders or shortcuts then you have every reason to panic if you you have very serious information in your device.
So what really happens.
The virus is dependent upon the autorun system of the computer to duplicate and infect targeted areas, since portable pendrives are the easy way of hardware sharing between one computer to the other, it makes them very vulnerable to virus infections.
Once you insert an infected pendrive Your Antivus programs have the capability to block the autorun file as the device is inserted. This prevents the virus from running and infecting other files within your computer.
A Virus is indeed smart, smart to the extent of setting a backup plan incase its blocked by the antivirus through autorun. The virus then replicates your files and hides your original files replacing them with a shortcut - not to your files but to the virus itself.
This action serves as it’s backup plan encase the autorun system fails. The original files are not damaged, only the attributes had been changed.
Understanding that only the attribute is changed then the solution is to reverse the process. And here is how.
- Insert your drive and note its name (say H:, I:, G: etc)
- Open the Command Prompt (easy way to do this: from start, type cmd, then click enter)
- Once the Black and white interface (cmd) start, type the name of the drive followed by :
Eg. H: then enter.
- Type attrib –s –h –r /s /d (remember, there is a space between (attrib)and (-s) and(-h) and(-r) etc)
- Then ENTER
CHECK YOUR DEVICE!
Further more we recommend usage of a good antivirus and we recommend KASPERSKY. Get it by clicking HERE
For more Technical support Contact Us:
2zone Technical Unity
Tags: shortcuts hidden files antivirus virus
Monday, 21. May 2012 - 11:21 Uhr
Some of you (infact many) have been receiving DM from your friends or other tweeter accounts saying "
‘Someone’s Saying Bad Things About You’
Well here is the story behind:
Hackers have managed to use fake tweeter ID which can spread faster (those having many followers or of big corporations) and send Direct Messages to followers saying someone is saying very bad things about you, or someone is saying very nasty things about you or someone is saying horrible things about you etc.
Then to see the so called "bad/ horrible/ nasty" thing that are being said about you you have to click on a link that is attached with the mail.
By the time you follow that link, it takes you to a fake twitter log in Page (you can not recognise if its a fake, looks identical) and you are required to log in as your session is expired already.
Your Log in details are then collected this information will pass on to hackers and your account gets compromised. After this, the hackers can misuse this twitter account to send more such provoking direct messages to more people and it starts to spread.
Now what happen after they have all your web adresses,?
you may see this as a very simple issue but for a company sending very sensitive information through the emails that they use on their social networks, Just image,the thousands of business email addresses hackers could forward their target website addresses or viruses.
This onlineespionage crippled companies and cost them millions of dollars in lost revenue and worker hours
Also, hacker may try and succeed to infect your computer with a virus
What to Do
If you get such message via email or Direct message on Twitter, do not click the link in this DM. Manually type twitter.com in the address bar of a browser and login to your twitter.
Click on messages, select thephishing message and click delete link at the bottom of the message,
then make sure you change your password atleast once after you have done the above process.
2zone Computers provide consultancy on email management service for compromised corporate email addresses and Antivirus softwares that can minimize this threats, Value your confidentiality, Data and internet experience.
Mobile: +255 719 792 703
Tags: twitter scams phising
SONY Genuine Flash Disks:
Get Yours NOW!
Huawei IDEOS phones
Kaspersky Antivirus 2012
eScan Antivirus 2012
DELL Latitudes D620/30
Executive Laptop Bags.
External Hard Disks.
Mobile : +255719792703
2zone and Company
For all your market solution and directories contact us: