Creating Bootable Pendrive By Cmd

bootable-usb-pendrive-by-cmdUsing a pendrive in a place of windows disc is a wonderful idea to choose and if you don’t have any USB Bootable Maker Software in your computer or maybe if you don’t want to use any of these software’s then there’s an another great way to create a bootable pendrive by just using your windows cmd comment prompt and also your windows setup files.

Creating a pendrive bootable by cmd is a very easy and quickest task to do and by just typing some commands on it will make your drive bootable and after that you can use it for every windows installation purpose. This cmd boot conversion will only works on Windows Vista/7/8/8.1/10 Setups and if you want to create a bootable pendrive for Windows Xpthen you’ll definitely need some software to make this bootable conversion possible for you.

Making USB bootable by cmd command prompt doesn’t require any software to use but you’ll defiantly need your windows setup files in order to make those files bootable in your pendrive. So, make sure your computer is working on windows operating system to use this cmd prompt for boot conversion and you’ll also have to make sure about you having all windows setup files in your computer for file transformation on pendrive.

STEP 1 – Open your windows cmd command prompt and run it as administrator for typing commands on it. I only suggest you to open cmd as administrator because the current user command prompt version won’t work for some administrator security reasons. There are so many ways to open cmd on your screen and some commonly used ways are mention in given picture below.

 

Run command to open cmd – “CMD”

 

different ways to open cmd as admin-min_zpspfpqifs1STEP 2 – Just after when your windows cmd opens up, then type a “diskpart” command on it and that will take you to the Disk Management Utility in the command prompt.

cmd diskpart command-min_zpsyxrmvo7k

 

STEP 3 – Now, type “list disk” to show every connect disk in your computer and after that just type “select disk #” (# Is Your Disk Or I Say Your Pendrive Disk Number). We do this to find our pendrive disk number in diskpart of cmd and tell our computer to make it as active to make some future bootable adjustment on it.

 

list disk and select disk on cmd-min_zpsxuou7ilqSTEP 4 – Selecting you’re pendrive in diskpart will makes your pendrive active for now on and after that there are some of commands you’ll have to type into it cmd for disk cleanup, partition creation and some other import process which is definitely needs for boot conversion.  So, there are some commands listed below which you’ll need to type into your command prompt.

Remaining Command for Type It –

  • Clean
  • Create partition primary
  • Select partition 1
  • Active
  • Format fs=ntfs quick
  • Assign
  • Exit

After typing these command on your cmd you’ve gonna done with this cmd process and you’ll need to go to next step listed down in this tutorial.

You can see the full command typed in cmd example below

 

full command list-min_zpssvyba2y6Now your pendrive made fully bootable and the only thing which remains now is to copy your windows setup files into the pendrive. You can use your windows installer disc to transfer setup files into your pendrive if you having one or you can use an iso image of your bootable windows image and extract it on your pendrive for files transformation propose.

So, Now You Have 3 Options to Choose and Those Are –

  • Transfer files from our computer’s drive to USB, if you having full windows setup files on your computer.

copy files from drive to usb device for bootable usb-min_zpsyctk37cx

 

  • Transfer files from Windows Disc to USB Pendrive, if you having a windows installation disc.

copy setup files from windows cd disc-min_zpsqjgtwfk0.jpg

 

  • Transfer files from ISO Disk Image to USB Pendrive by direct extracting files on USB.

iso to usb-min_zpsdhlfhlu9

 

A Useful Tip

You’ll have to make sure about that, you’ll only have to transfer windows files not a single setup folder. If you just only copied setup folder in our pendrive then your pendrive wont gonna boot when you want too.

last time  files check-min_zpsfig6uquf

 

If you like our posts please like us on facebook also.

Please share your views as comments.

Best 10 antivirus and antimalware free opensource applications

antivirus

Contrary to what many people think, anti-malware programs do not end with Symantec, McAfee etc. The world of open source has quite a few options in the anti-malware and anti-spyware segment. Here are 10 of the best that you can use!

1. ClamWin Free Antivirus


This is an app that works only on the Windows platform and works on the well known ClamAV engine in order to detect spyware and viruses. It has a Microsoft Outlook plug-in, automatic downloads and other useful features.

2. ClamAV

This is an open source product that is based on the Clam Antivirus engine. It is specially designed in order to protect email gateways. It has features like command line scanners, automatic updates. It works on Linux, Unix and BSD platforms.

3. Moon Secure Antivirus

This open source app is based on ClamAV and works on the Windows platform. Although it is based on ClamAV, developers usually use an alternate antivirus engine.

4. Rootkit Hunter

This is an open source tool that is used for scanning the system for rootkits and unwanted tools. You can not use it for scheduled or live scanning but you can still run Rootkit hunter daily. It works on Linux and Unix platforms.

5. AMaVis

AMaVis is short for A Mail Virus Scanner. As the name suggests, this app stands between your anti-virus software and email client, scanning incoming emails for viruses. It is compatible with all platforms.

6. ClamMail

This is a free antivirus software that protects messages that you receive on Thunderbird, Outlook, Eudora dn other POP3-based applications. It operated on the Windows platform and is a combination of the POP3 email proxy and the ClamAV engine.

7. P3Scan

This is an email proxy serve that can be used for scanning both outgoing and incoming messages. It cans for malware, trojans, viruses, spam and worms. It operates on the Linux platform and is also based on the ClamAV engine.

8. Viralator

This is an open source app that works alongside your anti-virus and supplements you computer’s protection. It blocks malware, which may have evaded your anti virus. It is compatible with Linux and Unix platforms.

9. xpy

This is a tiny program, which is less than 60 KB in size. It adds to your computer’s performance and improves its security by closing vulnerabilities that may lead to spyware creeping across your Windows-based system.

10. Nixory

This is a open source app that has been designed for improving the protection for Firefox users. It blocks unwanted spyware and cookies and works along side other anti spyware programs.

 

If you have some suggestions of your own please let us know in comments!

 

 

 

Top 10 Unbeatable Vulnerability Scanners you need to know

With efficient technology comes the issue of safety and security. Even as technology around us improves drastically, unsolicited vulnerabilities that might creep in have grown smarter and way difficult to detect. Detecting vulnerabilities can be a daunting task in its own right, however, a set of efficient scanners available make the process less cumbersome yet effective!

 

Here are top 10 unbeatable vulnerability scanners:


1. Nessus

-Features: patch, configuration, and compliance auditing; mobile, malware, and botnet discovery; sensitive data identification etc.

-Versions: Nessus and Nessus Perimeter Service (commercial organisations and enterprises), Nessus evaluations (commercial organisations) and Nessus Home (non-commercial, home network).

-Operating Systems supported: Windows, Mac OS X, OpenBSD, FreeBSD, Solaris, and/or other UNIX variants.

-Price: Paid

2. OpenVAS

-Framework of several services and tools that offers a comprehensive vulnerability scanning and vulnerability management solution.

-Consists of a daily updated feed of Network Vulnerability Tests (NVTs).

-Majority of components licensed under the GNU General Public License (GNU GPL).

-Operating Systems supported: Linux, Windows and others.

-Price: Free

3. CORE Impact Pro

-Taking vulnerabilty scanning to an all new level beyond traditional exploitation, CORE Impact Pro provides the same level of Advanced Persistent Threat and password-based techniques currently being deployed by various cyber criminals.

-Allowing commercial and government organisations to actively test the security of their network and application infrastructure.

-Operating System supported: Windows

-Price: Paid

4. Nexpose

-Scans for mis-configurations, vulnerabilities, and malware and then provides specific remedies for each issue.

-Scans the entire IT environment including networks, operating systems, web applications, databases, and virtualisation.

-Operating System supported: Windows and Linux.

-Price: Paid

5. GFI Lan Guard

-Scans and detects network vulnerabilities before they are exposed. This considerably reduces the time required to patch machines.

-Provides both security and non-security patches for Microsoft, Mac OS X, Linux and over 50 other third-party operating systems and applications.

-Operating System supported: Windows

-Price: Paid

6. QualysGuard

-Award-winning cloud security and compliance solution that provides global businesses with on demand critical security intelligence.

-Provides auditing, compliance and protection for Internet perimeter systems, internal networks, and web applications.

-Operating System supported: Windows

-Price: Paid

7. MBSA

-The Microsoft Baseline Security Analyser provides a streamlined detection of missing security updates and common security misconfigurations.

– The very recent MBSA 2.3 release adds support for Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012.

-Operating System supported: Windows

-Price: Free

8. Retina

-Perhaps one of the most sophisticated vulnerability assessment solutions available.

-Available as a standalone application or as part of the Retina CS unified vulnerability management platform.

-Efficiently identifies exposures (missing patches, configuration weaknesses etc.) and then prioritises enterprise-wide remediation.

-Operating System supported: Windows

-Price: Paid

9. Secunia PSI

-The Secunia Personal Software Inspector (PSI) efficiently identifies vulnerable and out-dated programs and plug-ins, that might expose your PC to attacks. It thereafter patch these vulnerable programs.

-Operating System supported: Windows

-Price: Free

10. Nipper

-The Network Infrastructure Parser checks the security of network devices such as switches, routers, and firewalls.

-It was earlier an open source tool. Then its developer (Titania) released a commercial version and tried to hide their old GPL releases.

-Operating System supported: Windows, Apple MAC OSX, Linux

-Price: Paid

 

If you have some suggestions of your own please let us know in comments!

 

 

10 tech products we lost in 2014

Every year, the tech industry brings us unexpected surprises and long-predicted changes, and among those ups and downs are usually a few endings to some of our favorite technology products.

This year was no different, with some of the biggest names in tech shuttering products and services beloved by many, and even a few successful upstarts deciding to call it a career and close up shop.

 

 

Perhaps the biggest ending of the year, and maybe even the decade, was Microsoft’s decision to end support for Windows XP. The move effectively left millions of users around the planet wondering whether they should fend for themselves, find an alternative or surrender and begin using Windows 8.1.

Similarly, although slightly less impactful, Google decided to shut down an entire social network when it opted to end the long run of Orkut.

The company’s original social-networking experiment failed to find legs in the U.S. but somehow managed to garner a large following in Brazil. But with Google+ on the menu, the lingering shadow of Orkut was apparently too much of a reminder of past failures to be allowed to live on, and now it’s history.

But those weren’t the only sad tech endings of 2014. We’ve gathered together the year’s most notable closures so you can mourn a bit more efficiently and light a digital flame in homage to some of the most beloved tech products and services that are no longer with us.