Skip to main content

Create un deletable and unnamed folder

Just create a folder using a trick, put your some files and sub folders within the created folder, but what’s Next? No one can Delete/Rename that folder, untill or unless you command that folder to detele or rename.

If you are one of those, seeking fun with friends then this trick is the correct choice to have fun with your friends, however this trick is not only for fun but also you can protect your valuable data, there are many such situation occur at the time of using your own computer i.e, deleted all the folder and by mistakely you deleted your valuable files, which hurts alot.

To know the trick to protect your valuable files then just follow the below steps that how can you create a folder that cannot be deleted or renamed. Step starts from CMD as Command Prompt from your computer, get the details instruction from the below steps.

Step1. Open CMD as Command Prompt. (Go to Start and type CMD)

Command Prompt

Note: After this step make sure that you will not select a root directory, means, you can only create this folder on non-rooted drives such as DEFG not the C drive because you have installed your windows on that Drive.

Step2. Open CMD and type E: and hit enter.

Select Your Desire Drive I have selected E:

Step3. Now type md con\ (MD represent Make Directory) Hit enter.

Note Why We Use con?: Files may be copied to devices. For example, copy file con outputs file to the screen console. Devices themselves may be copied to a destination file, For example, copy con file takes the text typed into the console and puts it into FILE, stopping when EOF (Ctrl+Z) is typed.

Now Type md con\

Note: You just created a new folder on E Drive, just check it out whether it worked or not, Confirm? OK if yes that means you created a folder, now delete that folder to make sure it is working as undeletable as Title of the tutorial mentioned, now put some folders and music files under con and again try to delete con folder if you see no changes that mean it worked on your computer.

Now Check Your Computer Drive

Now how to delete the undeletable folder? Follow below steps again!

Step. open your CMD again, type E: hit enter and again type rd con\ (Remove Directory) hit enter.

To Delete The Same Folder Type rd con\

Your file is deleted. everything is fine, just put the value or code correctly and you got what you want. Just make sure whether you are a programmer or not, typing a perfect code is the only genuine work, if you mislead or mistype then your code then it will not perform.

Stay ON, comment below if you want to know more tricks on the windows computer.

Comments

Popular posts from this blog

Kali linux android simply amazing

How to Install and run Kali Linux on any Android Smartphone TUTORIAL FOR INSTALLING AND RUNNING KALI LINUX ON ANDROID SMARTPHONES AND TABLETS Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have  it on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such a...

What is DNS

D NS stands for Domain Name System is used to as the medium to translate domain names to their respective IP addresses when a client initiates a request query. DNS stores the database of all the domain names and their IP addresses which are registered on the network. Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites Domain Names and their IP (Internet Protocol) addresses that are operational all over the world. Historical Notes The origins of DNS date back to the time of the ARPANET  when there were only a few computers to get an entry in the database. A HOSTS.TXT file was maintained by Stanford Research Institute, which constituted the data of all the machines, and was copied by all the host machines to remain updated. Jon Postel from the Information Sciences Institute requested Pau...

How tor works

 Using the publicly available data, data visualization software firm Uncharted has prepared TorFlow — a map for visualizing how TOR’s data looks as it flows all across the world. It shows TOR network’s node and data movements based on the IP addresses of relays bouncing around the connections of users to avoid spying. TOR is the world’s most widely used tool for anonymity purposes . It has grown into a powerful network that’s spread all over the world. Surprisingly, the TOR project is transparent about the location of the TOR nodes and thousands of machines that power the network. This non-profit organization frequently published an updated list about the bandwidth and location of the computers and data centers spread all across the world. Using the same public data,  TorFlow  maps the TOR network’s nodes and data flow all around the world. This data movement is measured based on the IP addresses and bandwidth of the relay computers bouncing around the...