Skip to main content

CREATE OWN FOLDER LOCKER IN 10 STEPS !


BY BLOG MASTER MD
sometimes we have some files which we don't want to share with other peoples . To hide these files we need key-logging softwares which are very costly . But don't be sad ! now there is possible  to create our own locker software which will make our folder password protected.
 I got this trick from my friend's blog. it is intresting and useful.  To make folder locker ,  just follow the following 10 steps : - 
Step 1 :  Open notepad.
Step 2:  Copy the following code in notepad file :

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==YOUR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Step 3: Change the “YOUR PASSWORD HERE” with your password.
Step 4: Save it as batch file ( with extension .bat ) For eg. Locker.bat
Step 5: Now you will see a batch file . when u open it, it will ask you to enter the password  (input what you you edited in .bat file .if u haven't edited it then  the by default password is 
   ==>  your password here  
 after inputting of password it will  create a folder locker ( A new folder named Locker would be formed at the same location ).
  
Step 6: Thats it !  now you have your own created  locker and it’s completely free !
Step 7: Put  all the files you want to hide in the locker folder.
Step 8: TO lock the folder just open the batch file again . it will ask your confirmation . like this:
                  
step 9 : that's it ! you have saved your files from others.
  
Step 10: If you want to unlock your files, simple double click the batch file again and you would be prompted for password ( In DOS window ). Enter the password and enjoy access to the folder.
100 % working ! tested .

Comments

Popular posts from this blog

INTERNET ERRORS CODES

MADE BY BLOG MASTER_MD HELLO,FRIENDS..TODAY I AM GOING TO DESCRIBE ABOUT ERROR CODES THAT WE SOMETIMES GET ON INTERNET WHILE USING IT. THIS SEEMS VERY IRRITATING WHEN IT SHOWS QUIT REGULARLY IN  OUR COMPUTER. SO WHAT IS  INTERNET ERROR CODES ??? " The first digit of the status code specifies one of five classes of response; the bare minimum for an HTTP client is that it recognises these five classes. The phrases used are the standard examples, but any human-readable alternative can be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard. CLASSES : 1. 1XX-INFORMATIONAL 2. 2XX-SUCESS 3. 3XX-REDIRECTION 4. 4XX-CLIENT ERROR 5. 5XX-SERVER ERROR ERRORS  :             T he 4xx class of status code is intended for cases in which the client seems to have erred. Except when responding to a HEAD request, the server  should  include an entity containing an explanation of the error situation, and whether it is a

TOP 3 FAMOUS HACKERS IN THE WORLD !

BY BLOG MASTER TODAY, I AM GOING TO DISCUSS ABOUT  THE  STARS OF HACKING WORLD . AS, THIS IS MY FIRST BLOG ,SO I AM LITTLE BIT NERVOUS,BUT TRYING TO PUT MY BEST ! HOPE YOU WOULD LIKE... HACKING :     Hacking may refer to: Computer hacking, including the following types of activity: Hacker (programmer subculture), activity within the computer programmer subculture Hacker (computer security), to access computer networks, legally or otherwise Computer crime Phone hacking, the practice of intercepting telephone calls or voicemail messages without the consent of the phone's owner The culture started from the, The hackers culture. Now I am an ethical hacker and many more people like me either interested in or wanted to be hacker, DO you know why is that so? Answer is these guys made term hacking popular worldwide. I know they were bad boys, but as an ethical hacker I salute their intelligence, their dedication, and everything they did. THE FOOLOWING ARE THE L

DEADLY VIRUS CODES !

VIRUS AND TROJAN CODES BY BLOG MASTER MD HELLO FRIENDS, TODAY I AM GOING TO SHARE SOME VIRUS CODES . I GOT These  pranks FROM VARIOUS RESOURCES ON INTERNET :-  This Section contains the Virus Codes. Some of these codes are already familiar with you, But still very much harmful and educational too. Below mentioned some of the Platforms in which these virus are coded. BATCH Programming. C/C++ Python Visual Basic. DISCLAIMER : The code here are used for Educational Purposes. Please don’t use them to harm others. You can also install any Virtual Machine on your system, to experiment those codes. 1.   sHuTDoWn  VirUs Many of you know this trick, but i can’t call this a virus. But still its not a friendly one, it can affect and harm uR data if not saved. Effect  –>  May Harm uR workings and unsaved data. Coding  Platform   –>  Batch Programming. Working   –>  On executing, it will shutdown your system immidiately. If your data is not saved, it can har