Skip to main content

How to recover files & folders hidden from short cut viruses in memory card or Pen drive?



How to recover files & folders hidden from short cut viruses in  memory card or Pen drive?

Today I tell you.how to recover hidden  files and folders.use any data recovery software , no need to ask for help from a techie .  it is very easy to recover your hidden files and folders , which has been converted  to shortcut folders or completely hidden your folders  with folder size in KB , but the property of your pen drive or memory card is showing data is present in the memory. Actually your data is present on the memory but it has been hidden . So just you need to follow the below mentioned step to recover the data :
For XP  windows  users
 – Please read all steps.
 1 – Insert your pen drive or memory card in to computer usb port  and open it .
 2 – Now go to – Tools >> Folder options >> Views >>Click on Show hidden files and folders.
 3 – Uncheck the box ,in front of –  Hide extension for unknown file types . once you uncheck this box , you will get a pop up warning with some message , click on option – YES .
 4 –Also Uncheck the box, in front of   -  Hide protected operating system files.  And click on – OK .
 5 – Now  you will find all your hidden folders on the screen . Open the folder & copy all the files of the folder in to another drive of the system.
Note – Make sure that antivirus software should be installed on the computer , otherwise  virus from your pen drive will effect all the folders of that system.

For Windows 7 & windows 8 users

 1 – Insert your pen drive or memory card in to computer usb port  and open it .
 2 – Now go to >> View >>options >>view >> Click on – show hidden files , folders & drives.
 3 – Uncheck the box ,in front of –  Hide extension for unknown file types . once you uncheck this box , you will get a pop up warning with some message , click on option – YES .
 4 –Also Uncheck the box, in front of   -  Hide protected operating system files.  And click on – OK .
5 – Now  you will find all your hidden folders on the screen . Open the folder & copy all the files of the folder in to another drive of the system.
Note – Make sure that antivirus software should be installed on the computer , otherwise  virus from your pen drive will effect all the folders of that system.

 

Comments

Popular posts from this blog

8 pair usage for data in Cat 6 Wire in Networking

Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

Tech Purchase Decision Making

  Research Methods for Finding Reliable Product Reviews Start with professional tech review sites like TechRadar, GSMArena, and The Verge for comprehensive tech product analysis. These platforms maintain editorial standards and often conduct hands-on testing before publishing reviews. YouTube channels from established tech reviewers offer visual unboxing videos and real-world usage demonstrations that reveal details traditional written reviews might miss. Cross-reference multiple sources to get a balanced perspective. Reddit communities like r/Android, r/technology, and product-specific subreddits provide unfiltered user experiences. Amazon verified purchase reviews help identify common issues, but focus on detailed reviews rather than single-sentence ratings. Check manufacturer forums and official support pages to understand known issues and firmware update histories. Professional review aggregators like Metacritic compile scores from multiple sources, giving you a consolidated vi...

OSI MODEL (Open Systems Interconnection model )

To Day I Explain OSI MODEL,   Open Systems Interconnection model  ( OSI ) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into  abstraction  layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1. The model groups communication functions into seven logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connection on that layer.  The Below Shown Diagram is helpful to understand the OSI seven Layer Model. OSI MODEL EXPLANATION Th...