CyberSolutions: 2018

Friday, August 17, 2018 Direct Downloader

Are you tried with downloading files from If you are a daily download user of then you find the solution here. Here is the 2018 script to download files from This is fully working script to download files at full speed without restriction.

We have already posted Download script but it no more working and it’s outdated. So here we have found another fully working 2018 script to download files from This is fully working script without any restriction support Internet download manager and acceleration.

The is a like Chinese google drive part of The a cloud drive for Chinese user gives you free 2 GB space to share files images videos. If you are a visitors to Chinese forum blogs, and interested to download files from outside of China but you can’t download at full speed and many restrictions. So here is the script to download files at full speed without restriction from


1.   Firefox or Chrome Browser.
2.   Internet Download Manager.
3.   Tampermonkey Extension.
4.   A Fast Internet Connection.

1.   First Install Tampermonkey Extension In Your Browser.
2.   Tampermonkey Chrome -> Link
3.   Tampermonkey Firefox -> Link
4.   Install script Script.

There is 2 script one is the downloader and another is download limit remover, you have to install 2 scripts to work the script without any problem. Downloader Script:- Link / Mirror Link
Download Limit Remover:- Link / Mirror Link


1.) First Read Requirements and Preparation.
2.) Download Tampermonkey Extension then Downloader scrip and Download limit remover scrip.
3.) Open any Visit any Link and click the last Download drop down menu then hit download.

 The download will start instantly with the full speed resumable link.

Note: - If you are logged in at Baidu, First log out your account the script will only work on logged out.

Wednesday, March 28, 2018

Delete vs Erase vs Shred vs Wipe: What's The Difference? Which One Should I Use?

Many of you might be using the terms delete, erase, shred, or wipe interchangeably. But, do you know that a “deleted” file is easily recoverable and you need to “erase” it to make sure that it’s gone forever? Depending upon the sensitivity of data and your intent, you can use an appropriate option and make sure that your data is always safe.

Whenever we talk about the terms like wipe, shred, delete, or erase, we often use them interchangeably. It’s generally acceptable in layman terms but these technology terms have distinct meanings and specific uses. In this article, I’m going to tell you why it’s important to understand the underlying differences and working.

What is Delete? ("Hide Me, but I'll Be Here If You Really Need Me")

Without a doubt, Delete is the common term on this list. In literal meaning, delete refers to the act of removing a file from a computer and smartphone. You might have noticed that the deleted files in your computer are sent to Recycle Bin. But, is that it?
Whenever you perform the delete action on your computer, smartphone, or any other electronic device, you don’t get rid of it. The deleted file exists on your computer–you’ve simply hidden it in some place that’s not visible. Various data recovery software make use of the same fact and impress you by recovering your “lost” data. In more technical terms, deletion process simply updates a database that keeps track of files on the disk and removes the location information. It simply tells the operating system that the space is now available to be written over.

When should I use delete?

If you’ve understood how delete operation works, you might’ve started feeling the risks of a simple delete operation. As your data is still on the hard drive, one can easily recover it and use it against you.
So, you shouldn’t use delete operation if you’re trying to get rid of some sensitive information. Use delete when it’s some movie, song, or some casual data–something that can’t be used against you.

What is Erase? ("Are You Sure? You'll NEVER See Me Again!")

When we talk about erasing a file, it means removing the file completely from a hard drive and making its recovery impossible. There are many ways to erase the data, including wiping, scrubbing, or simply destroying the data storage device. This process overwrites the data with repeated patterns of 0s and 1s. The level of sensitivity of data also decides what levels of erasure one should use to get rid of the data.

What is Shred? ("I'm Going to Erase This, and Only This")

Shredding is a process similar to erase. When you perform the shred operation, which is usually performed on one or more files/folder, you erase the selected data. It overwrites the space with the patterns of 0s and 1s. So, shred is the erase process performed on a small level.

What is Wipe? ("I'm Going to Erase EVERYTHING")

Wipe process is the erase process on a big scale. Usually used for getting rid of all the data on a drive, special programs that can wipe the entire hard drive are used. They overwrite every part for the drive and make sure that your drive becomes completely clean.

When should I use wipe or shred?

You must have a shredder installed on your computer all the time. If you’re getting rid of some sensitive files of folders, use shred operation.
If you’re getting rid of your PC or you’re going to sell your hard drive, it’s a good idea to wipe it. It’ll remove all the data from your computer and prevent it from passing to wrong hands. You can also wipe your hard drive when you’re done with it and you want to throw it away.

What About Formatting? Does it Delete or Erase Data?

If you've ever formatted a drive before, you might have been under the impression that it's one way to truly erase a drive. That may or may not have been the correct impression.
In any version of Windows, a quick format is always a fancy way of deleting - not erasing - the files on the drive. That's part of the reason it's so fast!
In Windows XP, the format process, no matter how you do it, is just a whole-drive-delete. The reason a normal format takes so long is because it's checking the drive for issues.
In Windows 10, Windows 8, Windows 7, and Windows Vista, a normal (non-quick) format automatically does a one-pass, write-zero overwriting of data - a very simple wipe, and probably just fine unless you work for the NSA.

VPN vs Proxy vs Tor

Due to security scandals and the sharp rise in online attacks around the world, people are more concerned with Internet security today than ever before.
And remaining anonymous online is simply a smart idea these days.
There’s just one problem, we have so many options at our disposal that it can be hard figure out which options provides the best security. And if you aren’t technologically literate, it can feel downright intimidating trying to decipher complex jargon that leaves us scratching our heads.
The best way to make a decision on how to protect your data is through information, so we need to look more closely at the most popular security techniques people use today. Which is why today we’re taking look at VPN vs proxy vs Tor as a means to efficiently secure and obfuscate your online identity .
They are all closely related, but each one has its fair share of advantages and disadvantages. For personal use, the leading three services people use to ensure that hackers and agencies don’t track them online are:
  1. VPN services
  2. Proxy servers
  3. Tor
But should you use a VPN and Tor together? Or use a VPN and a proxy at the same time? Let’s dig a little deeper to understand how each one of these technologies interplay and how they can protect you online.

How Tor (Supposedly) Protects Internet Privacy

Tor is one of the first services people turn to when they want anonymity while Internet browsing . However, there are still a lot of people that have never heard of Tor and many that don’t understand how it works, so let’s start with the basics.
Tor is a service that offers connections to a network of Tor servers. The basic guiding principal behind Tor is to ferret data around through a network of invisible servers, before it is reintroduced to the public Internet. By sending data through the Tor’s servers, it becomes impossible for online entities to see where the data originated from.
Tor is run by a network of volunteers who choose to host a Tor server. As data flows through the network of Tor’s servers, it is encrypted so third-parties cannot intercept and read the data (or that’s the ultimate goal, at least).
By sending communications through the Tor network, people won’t be able to read metadata such as the original source IP address. Your encrypted data is then sent to multiple Tor servers – called relays – before finally being decrypted and sent to the ultimate destination server. The idea is to obfuscate data so that it can be sent to a server from any number of Tor servers.
That way, hackers and government agencies can’t see the physical host computer from which the data was originally sent.
In theory, that all sounds good and well. However, do note some of the drawbacks of the Tor service, namely the FBI and US government’s involvement in the Tor network. One of the problems with the Tor network is that it helps criminals and innocent people both stay hidden from prying eyes.
Naturally, criminal activity attracts the attentions and involvement of the FBI. Essentially, good people using the same network as child pornographers and other disgusting criminals, will lead to undesirable associations.
The FBI managed to successfully attack the Tor network. But this is just one example of an attack on the Tor network, and there have been many others. All of these attacks and compromised identities make many people question whether they are really safe.
Because there are so many drawbacks to using Tor just on its own, you can’t really get the added anonymity benefits unless to is used with a VPN at the same time.

Rely servers are run by volunteers, so you have no way of knowing who runs the servers your data is flowing through.

Proxy Servers Explained

Most people have at least heard the term ‘proxy server’ and used them without even knowing it. But what is a proxy server, and how does it help increase security? A proxy server is essentially an intermediary device used to access web content by redirecting traffic.
Think of a proxy server as a middle-man in your Internet’s connection. Before data can reach the web server you are trying to connect to, it must first flow through the proxy server – for both inbound and outbound data. Sort of like a traffic controller.

For example, let’s say that you want to YouTube while eating lunch at work. Unfortunately, your employer has blocked access to YouTube by blocking its domain. What is one to do? Simple, just use a proxy server to circumvent the network restriction. After you’ve configured a proxy service inside a web browser, all the data is sent to the proxy server instead of being sent directly to the website being accessed.
Since the proxy server doesn’t have any domain restrictions, it is able to grab the video content from YouTube and send it back to your computer. But let’s take this one step further and consider how this can increase anonymity.
Any websites that you access through the proxy server are going to think the initial request originated from the proxy server – not your local computer. Not only will this hide who made the original request for a website, but it can also help spoof your IP address to access content that has been geo-blocked.
Let’s take a minute to talk about the different types of proxy servers.

1. Web Proxies

Web proxies mostly facilitate web browsing with HTTP traffic. In our earlier example 9about accessing YouTube), we were talking about a web proxy. But web proxies do have a few drawbacks, such as the inability to handle certain plugins and scripts (such as Java and Flash).
Unfortunately, because some web proxies are overused, they can easily be added to a blacklist of blocked IP addresses. A proxy server that is blocked by numerous websites loses its value, but they do hold a certain value for basic web browsing.

2. SOCKS Proxies

SOCKS proxy servers are more flexible than web proxy servers, since they allow more types of traffic. That means you can use SOCKS to:
  • Download files with FTP (File Transport Protocol),
  • Use them in P2P applications (in theory)
  • Send mail
However, they have several drawbacks such as:
  • Inherent security issues, 
  • They are slower than web proxies,
  • They need to be individually configured to each piece of software

3. Public Proxies

Public proxy servers seem to be people’s first choice when trying to circumvent network restrictions, because public proxies are free to use.
But their free price is a double-edged sword, which can make them unpredictable and unstable. You can find both SOCKS and web proxies that are publicly available, but they usually aren’t maintained as well as a paid service. In addition, they can easily become overburdened with too many users, and they generally contain rampant security threats.
After all, you have no idea who’s running the server. As such, it is highly inadvisable to use a public proxy service for anything personal. If you need to do some research or access a popular website that has been blocked, you’re usually in the clear as long as no personal information is sent through the proxy server.

Virtual Private Networks (VPNs) Explained

With so many rampant security flaws in the Tor network and proxy services, you might be wondering what a VPN tunnel has to offer. I don’t want to discredit Tor completely, because it is a great service to use if you first secure your data with a VPN tunnel (to add an extra layer of protection).

But it’s important to understand that a VPN tunnel has features that combine the best benefits of Tor and proxy services.
When a connection is established with a VPN server, all of the data between your computer and the server is 100% secure, as long as you use the latest security algorithms.
When a connection is established with a VPN server, all of the data between your computer and the server is 100% secure, as long as you use the latest security algorithms.
But there are several other key benefits to using a VPN service (over Tor and proxy services). First of all, because they are privately owned companies and networks, you don’t have to worry about interference by third-parties (with the exception of a handful of US-based VPN services).
Most VPN services also have strict no-logging policies to ensure that they protect the security and identity of customers. Yet another problem with Tor is that the relay servers could be run by anyone. You don’t know who they are or where they live, but a VPN service has a corporate identity – that is, you know exactly who is running the servers.
The same holds true for proxy servers, and you don’t always know what is happening behind the scenes.

In Summary

The question isn’t whether it’s VPN vs Tor vs proxy , because they should really be used together.
In addition, you probably wouldn’t want to consider using a VPN and proxy server at the same time, because VPN servers really act like proxy servers to begin with and adding an extra proxy server could increase latency (and complication).

Friday, March 2, 2018

Adding 'Open Command Window Here' To The Background Context Menu

The instructions mentioned above add the option to open Command Prompt on the folder context menu, but not when you Shift + right-click the background of the folder that is currently open.
If you want to Shift + right-click a background to open the location using Command Prompt, you need to follow these extra steps:
1. Use the Windows key + R keyboard shortcut to open the Run command.
2. Type regedit, and click OK to open the Registry.
3. Browse the following path:


4. Right-click the cmd (folder) key, and click Permissions.

5. Click the Advanced button.

6. On "Advanced Security Settings," click the Change link next to "Owner."

7. Type your account name in the provided field, click Check Names to verify you're typing the account name correctly, and click OK.

8. Check the Replace owner on subcontainers and objects option.

9. Click Apply.
10. Click OK.
11. On "Permissions," select the Administrators group.
12. Under "Permissions for Administrators," select Allow for the Full Control option.

13. Click Apply.
14. Click OK.
15. Inside the cmd (folder) key, right-click the HideBasedOnVelocityId DWORD, and click Rename.
16. Change the DWORD name from HideBasedOnVelocityId to ShowBasedOnVelocityId, and press Enter.

Once you complete these steps, when using the Shift + right-click combo on a folder background you will see the "Open command window here" option.

You can revert the changes following the same instructions, but on step No. 16, make sure to rename the DWORD from from ShowBasedOnVelocityId to HideBasedOnVelocityId, and press Enter.