Skip to main content

How to recover files & folders hidden from short cut viruses in memory card or Pen drive?



How to recover files & folders hidden from short cut viruses in  memory card or Pen drive?

Today I tell you.how to recover hidden  files and folders.use any data recovery software , no need to ask for help from a techie .  it is very easy to recover your hidden files and folders , which has been converted  to shortcut folders or completely hidden your folders  with folder size in KB , but the property of your pen drive or memory card is showing data is present in the memory. Actually your data is present on the memory but it has been hidden . So just you need to follow the below mentioned step to recover the data :
For XP  windows  users
 – Please read all steps.
 1 – Insert your pen drive or memory card in to computer usb port  and open it .
 2 – Now go to – Tools >> Folder options >> Views >>Click on Show hidden files and folders.
 3 – Uncheck the box ,in front of –  Hide extension for unknown file types . once you uncheck this box , you will get a pop up warning with some message , click on option – YES .
 4 –Also Uncheck the box, in front of   -  Hide protected operating system files.  And click on – OK .
 5 – Now  you will find all your hidden folders on the screen . Open the folder & copy all the files of the folder in to another drive of the system.
Note – Make sure that antivirus software should be installed on the computer , otherwise  virus from your pen drive will effect all the folders of that system.

For Windows 7 & windows 8 users

 1 – Insert your pen drive or memory card in to computer usb port  and open it .
 2 – Now go to >> View >>options >>view >> Click on – show hidden files , folders & drives.
 3 – Uncheck the box ,in front of –  Hide extension for unknown file types . once you uncheck this box , you will get a pop up warning with some message , click on option – YES .
 4 –Also Uncheck the box, in front of   -  Hide protected operating system files.  And click on – OK .
5 – Now  you will find all your hidden folders on the screen . Open the folder & copy all the files of the folder in to another drive of the system.
Note – Make sure that antivirus software should be installed on the computer , otherwise  virus from your pen drive will effect all the folders of that system.

 

Comments

Popular posts from this blog

Information Security Interview Questions & Answers

The number of Information Security related jobs are growing extensively…. There is a huge requirement for skilled InfoSec professionals across the globe.. the jobs positions are available for freshers, experienced guys and top management (typically CISO .HCL,BPLetc)… This post is my attempt to collect typical InfoSec interview question and answers to help those looking out opportunities in this field… I’ll keep on updating the questions regularly.. You can also share/contribute any questions you might have faced during your InfoSec interviews…. Category I: General Security Concepts / Network Security / OS Security 1) Is there any difference between Information Security and IT Security? If yes, please explain the difference. Ans- Yes. Information Security and IT Security are both different terms often used interchangeably. IT Security focuses on purely technical controls (like implementing antivirus, firewall, hardening systems etc) while Information Security is more wider ter...

8 pair usage for data in Cat 6 Wire in Networking

Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

MCSE INTERVIEW QUESTIONS AND ANSWER

MCSE INTERVIEW QUESTIONS AND ANSWER ,VERY USEFULL OUR NEXT JOB INTERVIEW MCSE Questions and Answers: :  1 :: What is the use of IGMP protocol?  Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages.  2 :: What are Ping and Tracert?  Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as trac...