Вы находитесь на странице: 1из 7

How to Recover Deleted Whatsapp Messages

Whatsapp messages info is Saved in Phone memory of Android devices. These messag
es are retrieved by us by doing some simple steps. Whatsapp takes backup day-today at 4 AM mechanically. Those messages can be restored by us simply which are
done till that time. Here is the step by step process to recoup your deleted wha
tsapp messages.
1. Visit your Android device s Settings, thenthen tap on Applications Option and
eventually click on Whatsapp
2. There would be warning message, click OK at that time, simply hit once on the
n and Clear data. Now you ve deleted all of your app s messages and data
3. Now return back and begin Whatsapp messenger app. Now as you ve removed all you
r saved data in above you will be welcomed with Configuration Screen of Whatsapp
4. Here you may Configure the Whatsapp by entering Mobile number to you. Simply
pat on the Restore button
Recovery. And after clicking on Restore button old messages have been restored b
y you. Dependant on your Chat history Whatsapp will restore your messages.
5. When its done, you may be able to determine Congratulation message with amoun
t of messages recovered.
That s it!!
This time, your whatsapp messages that were Deleted have been successfully resto
red by you.
So guys this is the tutorials to recover your whatsapp messages. If you have any
queries regarding this procedure do let us know through the comments
================================================================================
================================================================================
===========================================================
So foy your ease we are providing you 50 free proxy sites you can use them. And
enjoy your privacy. Yes this is really very easy to use.
HideMyAss - https://www.hidemyass.com/proxy
Proxify
http://proxify.com/p/
Ninja Clock
http://ninjacloak.com/
AnonyMouse - http://anonymouse.org/
AnonyMizer http://www.anonymizer.com/
kProxy http://www.kproxy.com/
BlewPass - http://www.blewpass.com/
Zfreez http://zendproxy.com/
Vobas
http://www.vobas.com/
Don t Filter
http://www.dontfilter.us/
Vtunnel
http://vtunnel.com/
Proxy.org http://proxy.org/
New Ip Now http://newipnow.com/
WebProxy.net http://webproxy.net/
4everproxy - http://4everproxy.com/
Unblock My Web http://www.unblockmyweb.com/
YouTube Unblock Proxy
http://youtubeunblockproxy.com
Working Proxy http://workingproxy.net
Free Open Proxy http://freeopenproxy.com
Proxy 2014 http://proxy2014.net
Unblock YouTube Free
http://unblockyoutubefree.net
Free YouTube http://freeyoutube.net
HideOnline Proxy
http://freeyoutube.net
Rapid Proxy
http://rapidproxy.us
Unblock YouTube Beat School
http://unblockyoutubeatschool.com
Hiding Your Info http://hidingyour.info
Unblocker
http://unblocker.us
Fast USA Proxy http://fastusaproxy.com

YouTube Free Proxy


http://youtubefreeproxy.net
Proxyo http://proxyo.info
Quickproxy
http://quickproxy.co.uk
Defilter http://defilter.us
Free Proxy Server
http://freeproxyserver.uk
Free YouProxyTube http://freeyouproxytube.com
The Best Proxy http://thebestproxy.info
EXCS http://ecxs.asia
Just Proxy
http://justproxy.co.uk
Proxy-2014 http://proxy-2014.com
VPN Browse http://vpnbrowse.com
ProxyOne https://proxyone.net
Web Proxy Free
http://webproxyfree.net
Can t Block This
http://cantblockthis.org
Hide The Internet
http://hidetheinternet.com
Greatest Free Proxy http://greatestfreeproxy.com
Proxay http://www.proxay.co.uk
ViewTube http://viewyoutube.net
PRO Unblock
http://pro-unblock.com
HideMyTraxProxy
https://hidemytraxproxy.ca/
Working Proxy http://workingproxy.net
Star Doll Proxy http://stardollproxy.com
HideMyAss UK http://hidemyass.co.uk
We hope that you have liked our article. Support us by sharing it more with your
friends.
================================================================================
================================================================================
===========================================================
Every internet user carries a USB flash drives because it keeps data secure and
sharing the information is a very easy task from one space to other.USB flash de
vices are used in the wide way as it provides lot of facilities to its customers
to perform their work in the easy way. Usually flash drives are very small size
to carry where we can store GB s of information in it.
protect-against-USB-virus
While coming to the virus topic USB devices has the possibility of carrying viru
ses in it which causes harm to the devices connected to it. Here we summed up so
me preventive measures and steps to prevent USB from virus attacks. Follow the b
elow steps carefully
Steps: How to protect USB from Virus attack
Here we have mentioned some specific methods which can be adapted to any operati
ng system
To protect USB drive from virus first of all it requires the permission from NTF
S.In the we are going to mention about the steps needed in converting the USB dr
ive into a NTFS file system. The FAT 32 is a security system which can be used on
different kind of operating systems like MAC, Windows and Linux.
Connect your USB device to the system and then go to the start menu and sear
ch for device manager then open it
After opening the device manager locate your USB device connected to the sys
tem and make right click on the USB drive then select properties
To select the better performance option to the USB device you should further
go to the policy tab option and then press on removal policy option there
Now move on to the MY COMPUTER option and locate the USB drive then right cl
ick on the USB and choose format

While following
rom the file system
After all these
ive using NTFS file

the steps, the user should make sure to have selected NTFS f
menu
steps finally click on the start button to format the USB dr
system

The above steps are used for successfully formatting the USB drive using the NTF
S file system
Configure root of USB
Follow the below steps to carry out the configuration process on your drive whic
h is required for rooting the device in read only mode
Move on to the MY COMPUTER space there locate your USB flash drice and selec
t properties
To make read only mode go to the security tab appears there and select every
one access only and give read only rights for the root folder
Write folder can also be created to allow reading and writing within it and
data can also be saved in the folder
Device Block
To protect your system from the unauthorized USB devices Device block is used.It
actually works as an anti virus tool which prevents the USB flash drive from sp
reading virus within the system.
================================================================================
================================================================================
==========================================================='
Website is the space in the internet which you can get lot of information relate
d to the different topics. Some topics such as education, social networking,game
s,movies ect while here they are also some niche sites which have adult content
in it and also they are some websites which tracks all your personal information
according to the browsing history. And also the websites which have malware vir
us adds that affects your PC, here is the trick for blocking all these unwanted
sites.
block-websites
PS: This trick can be very useful to the parents they can block all the social n
etworking websites and the malicious sites from viewing his/her children.
Here to follow the steps you need to have some knowledge about Windows Hosts fil
e.Well, the Windows Hosts file converts the host s names into the numbers, which a
re known as IP Addresses, where we can also locate a website using not only with
the host names but also with some numbers. Windows Hosts file is a simple text
file which can be edited in the notepad. Follow the below steps clearly in order
to block a website.
Steps: How to Block a Website on your PC
Firstly go to your MY COMPUTER open C drive (root directory) in which the wi
ndows is installed
After opening the root directory follow the below path given to go to the ne
eded settings
C:/ Drive => Windows =>System32 => drivers => etc.
Now open the ect folder by following the above path in the C drive there you
will find a host file,open the host file using notepad.
After opening the host file in the notepad you will see some information the

re find out 0.0.1 locate it and then press ENTER key to start with a new line.
In the new line you should mention the address of the website which is going
to be blocked with the code 0.0.1
Example: 127.0.0.1www.twitter.com
With the code adding to the websites in the new line you can block as many w
ebsites you want to be blocked
Here we are giving the steps without using any third-party application just by f
ollowing the root directory you can easily block any website.
================================================================================
================================================================================
===========================================================
Home
HTML
JavaScript
How to Encrypt HTML/JavaScript code to keep it safe
How to Encrypt HTML/JavaScript code to keep it safe
HTML JavaScript January 23, 2015 No Comments Mikael Aleksanyan
How to Encrypt HTML/JavaScript
How to Encrypt HTML JavaScript

Security is main thing. So even programmers think about how to secure their code
s. Today i will show you how to secure your HTML/JavaScript code by encrypting i
t. If you don t know what is Encryption then you can read it here on the Wiki.
For example you are creating a template for Blogger/WordPress platforms and sell
ing them online. Of course you need to add free templates too if you want to get
more users. But the main thing is that if you add the templates for free what y
ou will get from that. Well the main thing is that you can add your templates we
bsite or your information to footer of that template. But every newbie can easil
y edit your template and delete your information.
So to secure your code you must encrypt it. For that there are a lot of tools th
at you can easily encrypt your HTML or JavaScript code. Just follow to next step
s.

1) First of all we need to have a code we want to encrypt.


How to Encrypt HTML/JavaScript
How to Encrypt HTML/JavaScript
Example for this tutorial
2) After we need to open this website.
3) Now copy your code and insert into the text field.
4) After we need to select the type of code HTML or JavaScript. You can also add
additional features which are available at left side of website.
5) Now press on

Obfuscate

button and to select all encrypted code you can press on

Select

button.

Now we can test the HTML file and see that its working fine!
How to Encrypt HTML/JavaScript
How to Encrypt HTML/JavaScript
That s it. Now you can Secure the footer information of your template. Stay tuned
to learn about higher level security in JavaScript coding.
================================================================================
================================================================================
===========================================================
Pen-drive is a device which data can be transferred from one computer to the oth
er computer. They vary from different sizes and the memory spaces and it is smal
l in size which can carry a lot of information in GB s which is very useful to the
regular PC users to carry to any place. Hence people prefer Flash drives and Me
mory cards to carry the needed information,here we can have a option to the pen
drives in which they can be write protected since we cannot edit the write prote
cted files, it is just only for the reading information purpose when it is write
protected. And we also cannot copy the files of the pen drive which is write pr
otected.
Advantages for the USB write protection are we can prevent virus attacks and als
o Malware and virus can change settings into read only and can t be changed. There
is a small button on the Memory card which makes the data for read only purpose
to the user.
USB device
Steps: How to remove write protection of Pen-Drive/Memory Card
Here let us discuss about the removal of write protection in Transcend memory ca
rd or pen drive
Download the application Online recovery tools and run it on your personal c
omputer
After the downloading connect the pen drive/memory card to you personal comp
uter
There you can see two options available on the downloaded application if you
select the first option then the whole data will be removed and also the write
protection will be removed
If you want to remove only write protection then you click on the second opt
ion by securing all your pen drives data in the safe mode
Later this process click on the start button to complete the needed formatti
ng process
Removing write protection using Registry Editor
Click on the start button search for the run dialogue box and open it then t
ype regedit in that box
registry-editor
After pressing the ok button it will take us to the settings part which are
related to the system settings in the windows
Then search for the following register key from the edit menu in the setting
s window
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
remove-write-protection-using-registry-editor
If you do not find the following registry key from the edit menu then you sh

ould download the batch file from the below link given and run on your computer
then it will automatically adds to registry editor
Download Here

After the running of the application you again search for that key then ther
e go to write protect key and change the value from 1to 0 in which here 0 define
s OFF and 1 defines O
change-value-from-1-to-0
Then from this process we can remove the write protection in the pen drive a
nd memory cards.
================================================================================
================================================================================
===========================================================
1. Red Sea Governorate, Egypt (2722 50.10?N, 3337 54.62?E)
An interesting, mysterious pattern in the desert.
2.) A mysterious pattern in the desert (2722 50.10?N, 3337 54.62?E) Red Sea Governorat
e, Egypt
via Google Earth
2. Coronado, California, USA (3240 34.19?N 117 9 27.58?W)
See the Swastika-shaped building?
3.) A building complex that s shaped like a Swastika (3240 34.19?N 117 9 27.58?W) Corona
do, California, USA
via Google Earth
3. Kigosi Game Reserve, Tanzania (417 21.49? S 3123 46.46? E)
This is a massive herd of water buffalo.
4.) A massive herd of water buffalo (417 21.49? S 3123 46.46? E) Kigosi Game Reserve,
Tanzania
via Google Earth
4. Wittmann, Arizona, USA (33.747252, -112.633853)
That's a completely random triangle located in Arizona.
5.) This random, giant triangle in the middle of Arizona (33.747252, -112.633853
) Wittmann, Arizona, USA
via Google Earth
5. Walsh, Alberta, Canada (50 0 38.20?N 110 6 48.32?W)
The Badlands Guardian in the mountains.
6.) The Badlands Guardian in the mountains (50 0 38.20?N 110 6 48.32?W) Walsh, Alberta,
Canada
via Google Earth
6. Homebush Bay, Sydney, Australia (-33.836379, 151.080506)
SS Ayrfield, aka the floating forest, which is a shipwrecked boat covered in tre
es.
7.) The shipwrecked SS Ayrfield covered in trees (-33.836379, 151.080506) Homebu
sh Bay, Sydney, Australia
via Google Earth
ADVERTISEMENT
7. Dayton, Oregon, USA (45 7 25.87?N 123 6 48.97?W)
Firefox logo in a cornfield.
8.) A giant Firefox logo in a cornfield (45 7 25.87?N 123 6 48.97?W) Dayton, Oregon, U
SA
via Google Earth

8. Crdoba, Argentina (-33.867886, -63.987)


A guitar-shaped forest.
9.) A forest in the shape of a guitar (-33.867886, -63.987) Crdoba, Argentina
via Google Earth
9. Columbia Station, Ohio, USA (1.303921, -81.901693)
A heart-shaped lake
10.) This lake in the shape of a heart (1.303921, -81.901693) Columbia Station,
Ohio, USA
via Google Earth
10. Gobi Desert, China (40.452107, 93.742118)
Another mysterious pattern but this one is in the middle of the desert.
11.) A strange pattern in the middle of a desert (40.452107, 93.742118) China
via Google Earth
11. Nevada, USA (37.563936, -116.85123)
A giant target in the desert.
12.) This giant target in the desert (37.563936, -116.85123) Nevada, USA
via Google Earth
ADVERTISEMENT
12. Boise National Forest, Boise, Idaho, USA (43.645074, -115.993081)
I wonder what they made this out of?
13.) A message of love (43.645074, -115.993081) Boise National Forest, Boise, Id
aho, USA
via Google Earth
13. Moab, Utah, USA (3829 0.16?N 10940 52.80?W)
Potash evaporation ponds at the Intrepid mines.
16.) Potash ponds in Utah (3829 0.16?N 10940 52.80?W) Moab, Utah, USA
via Google Earth
14. Nevada, USA (37.629562, -116.849556)
More strange patterns, this one being in the sand in Nevada.
17.) A strange pattern in the sand (37.629562, -116.849556) Nevada, USA
via Google Earth
15. Arica, Chile (-18.529211, -70.249941)
50 meters tall and 120 meters wid, this is the world's largest coca-cola logo, w
hich is made out of 70,000 empty Coke bottles.
18.) This random Coca-Cola logo in the middle of nowhere (-18.529211, -70.249941
) Arica, Arica y Parinacota, Chile
via Google Earth
16. El Segundo, California (33.921277, -118.391674)
A giant Mattel logo.
23.) A giant Mattel logo (33.921277, -118.391674) El Segundo, California
via Google Earth
ADVERTISEMENT
17. Sahara Desert, southern Tnr of Niger (16.864841, 11.953808)
UTA Flight 772 Desert Memorial.
24.) UTA Flight 772 Desert Memorial (16.864841, 11.953808) Sahara Desert, southe
rn Tnr of Niger
via Google Earth

Вам также может понравиться