Dear reader,this is a subpage of our website: Wefreax.This contains our knowledge about operating system,softwares,hardware,tweaks and about different gadgets which we found cool and awesome.

As I am doing a post after a very long time am going to speak about an awesome trick of windows.

  1. No name...
  2. No icon...
  3. It is Hidden & System folder.
  • Make a folder at your desired location.I choose c:\
  • Give it's name as 0160 using numeric keys(While pressing Alt key).
  • Now make it without icon~steps:
  • Right click on it and open properties.
  • click customize and change icon.
  • Check the icon which don't have anything.
  • Now make it Hidden and system folder~steps:
  • Open command prompt(Start-Run-cmd)
  • Goto to place where you made the folder (In my case c:\)
  • Type attrib 0160(While pressing Alt) +h +s

+h & +s for hidden and system,For removing use above step with -s and -h.For viewing your folder goto folder properties and check show hidden folder and system folder.
You can treat the folder as normal folder.




Yesterday when Ashutosh call me and told me about Chrome, I was just as curious as any geek. I tried it, I liked it, but eventually I uninstalled it.

My views:
Chrome has better rendering engine(webkit) than FireFox(gecko).It takes less time to start and has better javascript performance,but it gets particularly slow and hogs resources when dealing with high amounts of graphics and Flash with multiple tabs open.During normal pages it uses only little less CPU memory,opens 3 application in task manager,it is a fact i checked it.Firefox 3.1, which Mozilla hopes to release by the end of the year, comes with JavaScript acceleration technology called TraceMonkey. FF has lot of addons which makes it kewl and far better than chrome.Chrome also don't have integrated download accelerator as we need most.I use {down them all} download accelerator which i found superb.Chrome has a specific mode which don't write anything to your pc otherwise in FireFox you have to open history and delete the pages and for wikipedia search you have to first open wikipedia website.I also don't like rss reader of chrome.
Folks like chrome more suitable to eyes but for me lot of skins of FireFox available,but i must say GUI of chrome is better.It is only for windows platform and it also don't warn me visiting dangerous site as wot does in FireFox and everybody knows windows is a sweet home of lot of Trojan's and viruses.It also don't have status bar,loads the entire page at once.I will try to get more how's its for security aspect.Lets see how google improves it in future release.Till now FireFox won the battle at least for me...

Interesting aspects of Chrome:
Google didn’t create a new rendering engine, they used an existing one
They analyzed Safari’s neat GUI tricks and implemented something even better.
They added an IE8-like domain highlight in the URL.
They got the Firefox’s Awesome Bar and improved it.
They got Opera’s Speed Dial and improved it.
They got IE8’s one-process-per-tab architecture and improved it.
They didn’t think of a Javascript JIT first, they just made it widely-available first.
They didn’t think about merging the address bar with the search bar, Mozilla announced it first, but Google released it before they did.
Safari 4 allows users to create shortcuts for their favorite web apps, but unfortunately it’s only out for developers…


Microsoft reserves 20% of your available bandwidth for their own
purposes like Windows Updates and interrogating your PC etc

Snatch it from Microsoft:

Click Start then Run and type: gpedit.msc .This opens
the group policy editor.
Navigate to Computer Configuration/Administrative Templates/Network/QOS Packet Scheduler and then to Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth. It will say it can't be
configured, but the truth is under the 'Explain' tab i.e."By
default, the Packet Scheduler limits the system to 20% of the
bandwidth of a connection, but you can use this setting to override
the default."
So the trick is to enable reservable bandwidth, then set it to zero.

Few days ago some of the system files of my windows XP(SP II) get deleted.I have a windows XP(SP I)installation cd.It is of no use as i don't want to install it because the drivers i have don,t support XP(SP I) .Then i found universal extractor through which i extracted xpsetup.exe.The system files get extracted,copied the missing file and paste it in Windows/system32 folder.so i decided to share UE setup file in my blog.

About Universal Extractor:
It allows you to extract files from many types of archive files, including ZIP, ARJ, ZH,MSI EXE created using various installer packages such as Wise and Inno Setup etc. It is great for testing application for portability because you can extract files directly from installer packages without having to go through the installation process.

Download it here:Universal Extractor

Hacker - One who infiltrates and explores various computer systems for the sole purpose of expanding their knowledge and satisfying their insatiable thirst for information.
Cracker - A hacker who acts maliciously. Deletes, crashes, implements viruses,etc.
Warez dude - A lowlife techno weenie who sells pirated software (basically people who couldn't quite make it as a hacker).
Eleet or leet - A hacker who's learned just about everything there is to know regarding computers, networks, and security. Many claim to be Eleet, very few are.
Newbie - An amateur hacker.
Lamer - A complete hacker wannabe. The difference between a newbie and a lamer is: A lamer knows a little bit, decides that's enough, and calls himself a hacker.A newbie also knows a little bit, but is humble enough to know that there is a lot more to be learned.
Root - Status on any system that gives the hacker total control of it. Usually,root is the desired end result of any hack.
Root shell - A shell is an interface between you as a user and a particular computer. So a root shell is a shell with root (superuser) privilege to resources on that machine. You can obtain a root shell by either logging into the box as root (assuming you have the password) or by using an exploit program to create a root shell for you.
Protocol - A of rules and guidelines that computers on a network must follow in order for communications to be coordinated, and therefor successful. A protocol defines specifically how data is broken into packets, sent over a wire, and reassembled at the other computer.
Proxy Server - If a company has its own network and its own website, there will be a portion of the network accessible (with a user name and password, of course) by anyone with Internet access. All the HTML files for the company's website will be somewhere on this segment of the network. Then, there will be the portion of the network strictly for business purposes, hidden from the rest of the world. A proxy server separates these two segments. So if you want to access the restricted part of any network, you will need to do it via the proxy server.
Firewall - Sort of like a proxy server, but has no other purpose but to keep unauthorized user out. Even if you have a valid user name and password for a system