1. Sex.com $12 million
Originally registered by Gary Kremen, a Silicon Valley software salesman, in 1994. Sold in a private sale for a mixture of cash and stock to Boston-based Escom LLC in January 2005.
2. Porn.com $9.5 million
MXN Limited bought its way into the porn industry in May. Brokered by Moniker.com, the deal stands as the largest all-cash URL transaction ever.
3. Business.com $7.5 million
Sold to ECompanies Venture Group, headed by former Disney executive Jake Weinbaum, in 1999. Yet even the highly prized name couldn’t protect the business from the dot-com bust; the site is now a parking lot for other URLs.
4. Diamond.com $7.5 million
Odimo sold this jewel of a site--along with its jewelry inventory--to Ice.com, an online retailer, in May 2006. Ice.com paid cash for the site and an extra $2 million for Odimo’s bling.
5. Beer.com $7 million
Originally owned by Bill Fisher, a Web site developer who also owned Budweiser.com and Guinness.com. Sold to Belgium-based Interbrew, the world’s second-largest brewer by volume, the site now features racy content aimed at a male audience.
Monday, December 31, 2007
Five Most Expensive URL's
Posted by
Neil
at
6:20 PM
0
comments
Track Exactly How You Spend Time At The Computer
Internet and computers are addictive. In a survey, 65 percent of Americans said they spent more time with a computer than with their spouse.
So how do you exactly spend your time at the computer ? Are you doing something productive or just whiling away time that could otherwise be utilized for better things. What apps are you using most frequently ? What websites and blog consume most of your time ?
You will get answers to all these questions and more through RescueTime, a free tool for PC and Mac that’s more like having Google Analytics for your computer.
RescueTime is a free tool that runs in the background and keeps a track of all your computer activities. Privacy experts may frown but all this data is uploaded every 30 minutes to the web and you can check your computer usage reports online from any computer. (see screenshot)
Since RescueTime is web+desktop solution, it can be used to track usage across computers (like home and work).
You can also selectively delete certain websites and software apps from your usage history. Or just add them to the ignore list and RescueTime would stop monitoring them.
Related: Shut Down Websites That Waste Time
Update: If you are worried about data that RescueTime is transferring from your computer to the web, check the log files available at the following location:
Windows XP:
C:\Documents and Settings\
Windows Vista:
C:\Users\
Posted by
Neil
at
6:07 PM
0
comments
Labels: feature, gtd, monitor, productivity, track
Turn One Computer into Two
Yes, two users can access one PC at a time. All you need is a computer with two monitors connected (e.g., using a dual-head video card) and an extra USB keyboard and mouse.
And do not confuse this setup with Microsoft Multipoint or dual-screens - here two monitors are connected to the same CPU but they are two separate computers. Two users can simultaneously perform different tasks on each of the monitor using their own keyboard and mouse.
This is possible through a free software called Userful which is essentially a Linux Live CD. You connect the two monitors to one computer, pop the CD inside and boot.
Now two users can surf different websites, access their personal emails, write documents and more at the same time on their personal screens. They’ll also have access to common devices like the printer and scanner attached to the main computer.
This solution may appeal when you have basic computing requirements or have no budget for an extra computer.
Posted by
Neil
at
5:11 PM
0
comments
Saturday, December 29, 2007
Connect Google Talk With Yahoo or Windows Live Messenger
Yahoo! Messenger and MSN (Windows Live) Messenger users can chat with each other easily without changing clients. Similarly, Google is working with AOL to allow users of Google Talk connect with their AIM buddies.
Now consider a completely different scenario - how do Google Talk users talk to their friends who are using Windows Live or Yahoo! Messenger ?
Here’s a a possible solution to make voice-over IP calls between Google Talk, MSN/Live Messenger and Yahoo! Messenger for free.
1. If you are on Google Talk and want to voice chat with someone on Yahoo!, add service@gtalk2voip.com as your Gtalk friend and then send the following message to your new buddy:
CALL xyz@yahoo.com [use your friends Yahoo! ID instead of xyz]
2. If you are on Yahoo! Messenger and want to connect with a Google Talk user, add gtalk2voip@yahoo.com to your Yahoo! buddy list and send the following message:
CALL xyz@gmail.com [use your friends Google Talk ID instead of xyz]
For more details visit GTalk2VoIP and their blog
Posted by
Neil
at
3:28 PM
0
comments
Labels: Google Talk, MSN Messenger, Windows Live, Yahoo Messenger
How to speed Up HTTP Requests On Internet Explorer
To comply with current Internet standards, Internet Explorer limits the number of simultaneous downloads to two downloads, plus one queued download. This configuration is a function of the browser. However, as connection speeds increase, and the number of total connections that are allowed to Internet servers increase, the two-connection limit may be restrictive.
Please Note: Changing the maximum number of connections beyond two is a violation of Internet standards; use at your own risk!
To increase the number of simultaneous connections that are allowed, follow these steps:
1. Start the Registry Editor
2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings
3. Select New > DWORD Value from the Edit menu
4. Name the new value MaxConnectionsPer1_0Server
5. Right-click the MaxConnectionsPer1_0Server value and choose Modify
6. Under Base, click the radio button next to Decimal
7. In the Value Data: box enter the number of simultaneous connections you want to set (for example 10 is a good value), and 8. click OK
9. Repeat steps 3 - 7 using the new value MaxConnectionsPerServer
10. Exit the registry editor
Posted by
Neil
at
3:15 PM
0
comments
Labels: HTTP, Internet Explorer
Diffrence b\w school and college
School: 1 colored dress for 100s of days
College: 100 colored dresses for 100 days
School: 2 note books for 1 subject
College: 1 notebook for all subjects
School: White pipe in teacher's hand (chalk)
College: White pipe in student's hand (cigarette)
School: Most frequent letter-Leave letter
College: Most frequent letter - Love letter
School: If we go itz boring
college: If we dont go its boring....
Posted by
Neil
at
3:09 PM
0
comments
Labels: School. College
Thursday, December 27, 2007
Top 10 Hacks of all time
Here is a list off the top 10 hacks of all time.
Early 1990s
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.
November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.
1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.
1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.
1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.
1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.
1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.
1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.
2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.
1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.
Posted by
Neil
at
3:39 PM
0
comments
Labels: Top ten Best Hacks
All In One Messengers
All in one messengers allows you to communicate with users of AOL, MSN, Yahoo and ICQ and other instant messengers from a single program. This program are available for free of cost. Here are the some the All in one messengers.
Pidgin
PidginTeam has released a new version of their famous multiprotocol instant messaging client. Pidgin allows you to use all of your IM accounts at once and works with the following networks:
* AIM * Bonjour * Gadu-Gadu * Google Talk * Groupwise * ICQ * IRC * MSN * QQ * SILC * SIMPLE * Sametime * XMPP * Yahoo! * Zephyr
Download Pidgin 2.2.2
AirTalkr - For Google Talk, AIM, ICQ, MSN, WLM and Yahoo Networks
AirTalkr is a multi-protocol instant messaging client that connects to MSN, WLM, Yahoo!, GTalk, AOL and ICQ. It also has connects to various Web 2.0 services like Flickr and YouTube.
AirTalkr runs on Adobe AIR, so you will need the runtime to use it. As of now, AirTalkr can run on Windows and Mac. On top of chatting with your friends, you can watch and search photos from Flickr and videos from YouTube without leaving your desktop. You can view each of your buddies AirCard, a profiling system in AirTalkr that gathers your buddies profile from the web!
SrevIM is an instant messanging application that enables you to connect to multiple networks at once such as Yahoo, MSN, AIM, Google Talk and ICQ. This requires you to create an account first at srevspace.com
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAYeS54A0ZOwCKcKZbwt2hz4Q139v6PlOW04hijq0gdcfqgSizqcAnM4gPhoZn5Z0PYNNBO2KwliDMibFOrA7s1ZLsv6rv7eSb7sW0B-PswEo4jJ9lSoHUy1r-oW_kvbysINNpO1fdOOAs/s400/SrevIM_1.png)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Fr4Qp2wecwHPtS-su2Tktxd2qF8OdsIJWz3nJXVt1vcnr8NeSwh2RaWln3EpsHbtra5VxoA-0NxuxTRVlZN2K1i0PYbv2Xp0X6aXWjR2bBTI6Set5bqmCfSPkDOgRheKZzqzilNBdPeZ/s400/SrevIM_4.png)
Posted by
Neil
at
3:02 PM
0
comments
Labels: All in one messenger, instant messaging, instant messenger, Messenger
Wednesday, December 26, 2007
Why Just YouTube? Upload Video Clips To Multiple Sites in One Shot!
The market share of YouTube Videos (at 64%) is more than all other online video sharing websites combined. No wonder that YouTube is the preferred destination for uploading video on the Internet as it offers the maximum eyeballs.
While it’s true that videos posted on YouTube can quickly get the much needed exposure but by limiting yourself just to YouTube, you are actually missing an opportunity to expose your videos to the non-YouTube crowd and that is no insignificant number.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2zOL8ceqjcpw_plRww3-LDbiSpS6NPrjzRRMJ1Dqf-W8IeIz49Vd2_XzRIp_u_B1uNfOAoPrizIqgvewZsvOhFfWkfCuELK0dY72z9wwr_5Zi9r9PILExqCELg1IzJMRL9ekyeFX7qIal/s400/youtubevideomarketshare.png)
In fact, your videos could gain higher visibility on small video sharing sites than YouTube because the overall content is less and therefore videos (that have the right tags and descriptions) have better chances of getting listed in the top search results.
Now if you are convinced that you should publish videos to non-YouTube video sharing sites as well, the immediate problem is time - it is tough for anyone to visit a dozen different video sharing websites, fill in the same details about the video and wait for the upload to finish.
Luckily, there are some very good online tools like Hey!Spread and TubeMogul that can do all the hard work - they’ll easily upload your video to all popular video sharing websites in just one click.
Hey! Spread works like this - you specify the location of your video file on the hard drive, select the sites where you want to simultaneously upload the video, type your login credentials and hit Go. You’ll soon receive an email in your inbox specifying the status of your uploads and the URLs of the video on different video sharing websites.
And there’s more. If you have a video that’s already up on YouTube or other sites, Hey!Spread can fetch that video and spread it to all other sites as well. It does this on its own servers, you need not have to download the YouTube video before uploading it again to other places like Blip, Google Video, Facebook, MySpace, etc.
The other popular service, TubeMogul adds the analytics component to their Universal Video Uploader. When you upload a video to multiple website using TubeMogul, you can actually track how often your videos were watched on different websites.And it works just like Hey!Spread. You upload the video to TubeMogul, then enter the Title plus Description and finally pick video sites where you want to deploy your videos.
You can also save your login and password information (for different online video sites) in your TubeMogul account so you don’t have to type those details again during the next upload.
Posted by
Neil
at
3:27 PM
0
comments
Self distructing Email - MI3
Want to delete the email which sent to ur mail without ur friend's knowledge?
One of the best service i found online n using it too personally..
Big Brother is Watching..............Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient's inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do you want something that you type today to be used against you tomorrow, next week, next month or even in the next decade?
Until now, everyone else has had control of the email that you have sent. BigString gives you back control of your email, acting like an automatic shredder for your email. You can self-destruct or change an email that's already been sent or read. Don't leave your messages sitting in peoples' inboxes forever. Get a free BigString email account to protect your privacy.
BigString takes the risk out of email. Now, with BigString, you can finally take the risk out of email and put an end to "sender regret." It is the world's first & only email service that thoroughly protects your safety and privacy.
BigString's exclusive, patent-pending technology enables you to prevent your personal or business information from lingering indefinitely in someone else's inbox. It also restricts private pictures or messages from being indiscriminately spread throughout cyberspace! Now your sensitive photos can't be posted to unseemly web sites or printed for circulation amongst total strangers.
BigString lets you have second thoughts
BigString shifts the control from the recipient to YOU the sender. BigString grants the luxury of second thoughts, the power to limit message viewings, and the choice to delay email transmission.
You can reword a message fired off in anger or haste or completely delete it! You can recall a botched résumé for revision or erase a tasteless joke. You can make a work of art or photograph print-proof. You can prevent a love letter from being forwarded. You can set an expiration date on an emailed price quote or business offer or you can simply pull back an email to eliminate typos.
BigString takes the danger out of clicking
BigString guarantees that clicking "send" will never again be an irreversible disaster. Now YOU decide the fate of your emails. You decide where they end up, who sees them and for how long. BigString emails can be destroyed, recalled or changed even after they've been opened! The freedom is yours, the options are yours, and you're the boss with BigString.
BigString is easy to use
BigString is as easy to use as any other email and there's nothing to download! Don't be resigned to the mercy of your recipient. You don't want your every action to be carved in stone because sometimes you just NEED to take it back!
Here are just a few of the many applications of BigString. Erasable, Recallable, Non-Printable Email.
Executives: Protect your business and safeguard your email. Now you never have to worry about sending the wrong attachment or completely forgetting it. Misspelled words, incorrect dates, or other typos can all be fixed even after your message has been sent. You can even "pull an email back" to delete expired price quotes, old business offers or dated legal material. BigString is your email insurance.
On-Line Daters: You don't want your personal information like pictures, phone numbers or intimate notes, circulated around the Internet! BigString prevents your pictures and messages from being printed or forwarded. You can set an expiration date for an email or self-destruct it at will. You can choose the number of times you'll allow a picture to be viewed before it disappears. BigString protects your privacy!
Artists and Photographers: Now with BigString you can confidently email proofs and samples without the slightest fear that they will be printed or saved for later use without your authorization. Use BigString to make your image non-savable and non-printable! Limit the number of times a client can view a piece before you have it self-destruct. You can even recall a sent email to delete an old price quote or alter a new one. You can also prevent it from being forwarded to other customers. BigString protects your rights of ownership!
Copywriters: Spelling or punctuation errors that can cost time, money, or embarrassment are now a thing of the past. With BigString, clicking "send" is no longer an action "carved in stone." Accidentally arranging paragraphs in the wrong order will no longer mean a lost account. With the technology of BigString you can recall that mistake-ridden copy and correct the errors even after your email has left the outbox. You can self-destruct what you sent all together and replace it with a fully revised version. Only you will know this switch has occurred! With BigString you can confidently send non-printable, non-savable sample copy. You no longer have to worry that it will be used without your knowledge. You're the boss with BigString.
Posted by
Neil
at
3:07 PM
0
comments
Labels: Big String, Bigstring, Self distructing Email
Thursday, December 20, 2007
Surprise Yahoo! Messenger Friends Who Pretend to be Offline
You want to chat with a buddy on Yahoo! Messenger but his status on Yahoo! says Off-Line.
There are two possibilities here - your friend could be really offline or he may have logged into Yahoo! Messenger in “Invisible Mode” to avoid interruptions.
(Yahoo! Messenger has a Stealth settings feature that lets you choose the people who see you as online and offline.)
You can however beat that mask easily with services like Xeeber or VNGrabber that reveal the exact status of your Yahoo! Messenger friends or any other Yahoo! user.
All you have to do is type the Yahoo! Messenger username and you will instantly know the exact online status of that person. Time to put on your detective gloves.
Visit XeeBer.com and VNGrabber.com
Posted by
Neil
at
11:57 AM
0
comments
Labels: Invisible Mode, Offline, Yahoo, Yahoo Messenger
Get a second chance to pass your Microsoft Certification exam—free!
For a limited time, you can get a free, second shot at any IT professional, developer, or Microsoft Dynamics certification exam. Just register for this offer before your first exam, and you will get two chances to pass. But this offer won't last forever.
http://www.microsoft.com/learning/mcp/offers/secondshot/default.mspx
Learn the skills you need to get your Microsoft Certification
After you register, you can take advantage of special training and certification deals from Microsoft.
Posted by
Neil
at
11:43 AM
0
comments
Google Knol
Knol is a project planned by Google for user-generated articles on topics ranging from "scientific concepts, to medical information, from geographical and historical, to entertainment, from product information, to how-to-fix-it instructions." It was announced on December 13, 2007. Knol pages are "meant to be the first thing someone who searches for this topic for the first time will want to read", according to Udi Manber, a Vice President of Engineering at Google. The term knol, coined by Google to mean a "unit of knowledge", refers to both the project and an article in the project. The site has been seen by many as Google's attempt to compete with Wikipedia, while others liken it to About.com or Squidoo.
The site is currently in private beta, and requests to create "knols" are by invitation only. According to Danny Sullivan, an editor of Search Engine Land, Google told him that it is possible that the site might never launch.
Posted by
Neil
at
11:39 AM
0
comments
Wednesday, December 19, 2007
How to increase your download speed by 100-200 kbps
First of all download this wonderful program:
http://www.speedguide.net/files/TCPOptimizer.exe
Then when u start trhe program goto settings goto cable modem or dsl whatevcer u have.
Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.
Thats bout it!! Enjoy the speed!!
Posted by
Neil
at
1:59 PM
0
comments
Tallest men in the world
Posted by
Neil
at
1:10 PM
0
comments
Labels: Guinness Book, Tallest men, world Record
Wanna protect your password?
- According to Ken Munro, the managing director of SecureTest, you should never use a word that is in the dictionary for your password. (Seemingly online fraudsters have written programs that can try thousands of different passwords and try every word in the dictionary. A good password will mix letters, numbers and punctuation, but the strongest contain non-alphanumeric characters or symbols, of course not all password systems allow them, so we're stuffed.)
- The next generation of chip will pack more than four hundred million transistors into an area the size of a postage stamp. (That is of course computer chip, not french fry chip.)
Posted by
Neil
at
1:01 PM
0
comments
Monday, December 17, 2007
Wanna track email which you have sent ?
MailTracking.com - What is it and how does it work? What is MailTracking? MailTracking is the most powerful and reliable email tracking service that exists today. In short - MailTracking tells you when email you sent gets read / re-opened / forwarded and so much more
email tracking - The Ethical Hacking How do I send a tracked email? There are two ways you can send tracked emails:
1. Simply add: .mailtracking.com to the end of your recipients email address (they won't see this)
or
2. Install our (ActiveTracker plugin)(http://www.mailtracking.com/mailtracking/plugin.asp) to add the tracking for you.
Testing? If you send tracked emails to yourself, your anti-spam filters may block them (people don't usually write to themselves) - so we recommend you test by sending to other people. email tracking - The Ethical Hacking What will you tell me about the tracked emails I send? MailTracking will endeavour to provide the following in your tracking reports:
* Date and time opened
* Location of recipient (per their ISP city /town)
* Map of location (available on paid subscriptions)
* Recipients IP address
* Apparent email address of opening (if available)
* Referrer details (ie; if accessed via web mail etc)
* URL clicks
* How long the email was read for
* How many times your email was opened
* If your email was forwarded, or opened on a different computer
All messages sent via MailTracking benefit from our (SPF compliant)(http://spf.pobox.com/) and (Sender-ID compliant)(http://www.microsoft.com/mscorp/twc/privacy/spam/senderid/overview.mspx) mail servers. This confirms safe transmission of your messages, and also enables us to report delivery status to you (including: bounce-backs, delays and success notifications). Delivery information is listed in your Personal Tracking Page. Note: MailTracking.com does not use or contain any spy-ware, mal-ware, nor virues, it is not illegal to use, and does not breach any privacy regulations in any countries. What else does MailTracking do? email tracking - The Ethical HackingThere are lots of great features available to you - these include the following sending options:
* Certified email
* Ensured-Receipts and retractable emails
* Invisible tracking
* Self-Destructing emails
* Block printing
* Block forwarding
* Adobe Acrobat (PDF Document Tracking)(http://www.mailtracking.com/mailtracking/pmdoctrack.asp)
* Secure Encypted emails
* Track MS Word or Excel documents
You can also choose how to receive your receipts:
* In your Personal Tracking Page (when you log in)
* Email ReadNotifications
* Legal Proof-of-Opening receipts
* Delivery Service Notifications (DSN's)
* SMS alert on your cell-phone or pager
* Instant Messenger
These options are available to you from "My Account" in Member Utilities. Getting started MailTracking offers a lot of features and sending options, but it is very easy to use our service. On start up, your account is already configured per our 'Recommended' tracking defaults - and we will automatically send you email ReadNotifications when your tracked emails are opened. If you'd like to take us for a 'test drive', please sign up for no-obligation free trial from the MailTracking.com
Posted by
Neil
at
11:51 AM
0
comments
Labels: email tracking
Nokia 8800 Sirocco Diamond Edition
Design and made by Sayn Design in Germany, only 1000 units of the limited edition will be produced. You can find the phone open for auction on ebay, for the price of $3450 USD.
Outstanding features:
* Cover made of high-quality high-grade steel, 24 carat hardgilds, 999er Feingold, high gloss
* 2 Megapixel Camera
* Weight: 139 g
* 100 MB internal memory
* Dimensions: 107 x 45 x 16.5 mm
* Display: 256k colors TFT (208 x 208)
* Bluetooth, Java, MP3 player
* EDGE, GPRS
* GSM Triband 900/1800/1900 MHz
Posted by
Neil
at
11:37 AM
0
comments
Friday, December 14, 2007
Folder Lock without any Software
Open Notepad and copy the below code and save as locker.bat. At first time start it will create folder with Locker automatically for u. Don't forget to change your password in the code its shown the place where to type your password.
after creation of Locker folder again click on the locker.bat.it will ask.press Y then Locker folder will be disappeared.again to get it click on locker.bat. and give ur password u will get the folder again.
**********************************************************
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Posted by
Neil
at
12:06 PM
0
comments