Posts

AutoCorrect Feature in MS Word 2003

MS Word is an impressive text editor from MS Office and it an be used for creating various text documents. MS Word has got loads of features which has enhanced the document creation and amongst many features AutoCorrect feature is one of them. AutoCorrect feature can be helpful in various word processing tasks. With this feature you can locate the misspelled words easily. This feature will correct the spelling automatically as you type. AutoCorrect feature can be customized easily so that most commonly used words will be entered automatically without typing the whole word. Modifying AutoCorrect: For modifying the AutoCorrect feature you are required to follow these simple steps. 1 st  of all you are required to click on Tools. Now from the menu bar select AutoCorrect options and then you will see AutoCorrect Options dialog box will appear. You in the next step check or deselect any of the following options: Show AutoCorrect Options buttons Correct two initial capital

How to Insert, Copy and Delete Slides in MS PowerPOint XP

MS PowePoint XP is a handy application which was developed for creating slideshows and presentations. In this tutorial you will learn how to open a presentation, inserting, copying and deleting a slide.  Opening a Presentation: Presentations can be opened quickly if you have saved them previously using the task pane. In order to open a presentation you need to follow these simple steps. 1 st  of all start PowerPoint. In the task pane under the Open a Presentation option click the presentation which you need to open. You can also opt for an alternative way. Go to the File menu and select Open. ( File>Open.) Now navigate to the file which you need to open. Inserting a New Slide: Once the new slide is created you would want to add more slides in your presentation and for that you need to follow these simple steps. Click Insert>New Slide. ( Press Ctrl+M from your keyboard. ) Move the arrow pointer over the layouts or opt for the scroll bar and select the s

Controlling Windows 10 with Your Voice

In order to perform the tasks quickly and instantly you can use the voice control. Windows 10 has got built-in voice controls for some of the mostly used applications and features like Cortana which will let you search for apps or let you get answer to different questions easily. In this tutorial you will learn how to control Windows 10 with your voice. 1 st  of all you need to type Windows Speech into the Cortana search bar and then tap Windows Speech Recognition for opening it. Now you need to click on Next in the pop-up window in order to get things started. Now select your microphone and then press Next and of you are looking for best results use a microphone or headset. Now you need to follow the onscreen instructions for microphone placement and then press Next once you are ready. Now read the on-screen prompt to calibrate the microphone and then press Next. Select whether to let your computer to review documents and e-mail to better understand you whenever y

How to Delete Locked File in Windows 10

In Windows 10 whenever you will try to open a locked folder the system will not allow you to perform any task with the locked folder like opening it, deleting it or moving it. For performing these tasks you require a password. For the folders which are locked by others, opening is not an option but yes you can delete them and for that remember the simple right click Delete will not work.  Now in order to delete the locked files you need to follow these simple steps. 1 st  of all you are required to locate the folder which you want to delete. Now you are required to download Process Explorer from Microsoft Website ( https://docs.microsoft.com/en-us/ sysinternals /downloads/process-explorer ) and then press OK on the pop up window which will appear. Now you need to double click processexp64 in order to extract the file. Now select Extract All and then click Open. Now double click the procexp64 application in order to open the application. Now select Run and then read

Disabling the Lock Screen in Windows 10

Windows 10 is the latest Windows operating system which has enhanced the user experience to a great degree. Now in Windows 10 whenever your computer boots or wakes from sleep you need to click with your mouse button or need to swipre up on touch screens for making the lock-screen disappear before you access the login prompt. Now you can easily save your time as well as click simply by disabling the lock screen and then going straight into the login screen in Windows 10. For disabling the lock screen you need to follow these simple steps. 1 st  of all you are required to open the registry editor for that press Ctrl+R and then type regedit into the prompt and then press Enter. Click on Yes if you receive a warning from User Account Control. Now navigate to  HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows  by opening different folders in the tree. Now is the time to create a new registry key which is known as Personalization if does not exist already. ( For creating the ke

Capture Keystrokes & Passwords Remotely

Image
  Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat clients. The collected data can often reveal usernames, passwords, and potentially compromising and private information which hackers abuse for financial gain. Once a hacker has created a payload and established a backdoor on the target computer of their choice, they have the full power of Metasploit to help them perform whatever post-exploitation attacks needed to get what they want. If it’s your computer, they could capture your screenshots, steal your browser passwords, recover your deleted files, and yes … see everything that you’re typing. we’ll highlight exactly how a hacker could use Metasploit to capture and collect keystrokes and passwords being entered on compromised computers, as well as what potential targets could do to prevent such an attack. Using Metasploit’s Keylogger A keylogger is a software that tracks and logs the keys pressed on the keyboar

Make Your Own Evil USB

Image
  Recently, someone asked how to make your own “Evil USB,” and I promised to make a how-to on this topic. In addition, it would be nice to have something related on our WonderHowTo world. So here it is! Introduction Most common USB flash drives are exploitable due to the “BadUSB” vulnerability. This allows us hackers to reprogram the microcontroller in them to act as a human interface device (HID), e.g., a keyboard, and perform custom keystrokes on our target machine. This scenario is often called an “HID Payload Attack,” since you have to hand over your script to the Bad USB for the execution (more on that later). Even though almost every USB flash drive is exploitable, the only released reprogramming method is for “Phison” microcontrollers. In this tutorial, we are going to determine the microcontroller of your USB flash drive, compile the source code published in GitHub for the tools we need, and move over to building a custom firmware with an embedded HID payload that will turn our