Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine. Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India. Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit...
Hello friends! You might have many software on the internet which is used to lock the files and folders. Also you might have seen batch programs that also does the same job. Today I am going to tell you a basic cmd command that can be used to restrict access to files and folders. You must have administrative access for doing this.
Comments
Post a Comment