Skip to main content

Windows 10 Operating System and its installation


Windows 10 Operating System and its installation
Microsoft Windows 10 is the latest version of windows. It is safe and secure. It is combination of Microsoft Windows 7 & 8. It comes with windows defender which is an anti-virus that detects computer viruses and other kind of malware and remove them from computer. Microsoft is still working on it to make it more safe and secure and they are updating it and fixing bugs.
Installation:
The following are the steps that you should follow for installing Microsoft windows 10:
1.    Turn on computer and insert DVD or connect USB of Windows 10 and then boot the computer. Make sure DVD is set as the first boot device.
2.    Then after some time a screen would appear and they would ask you to choose that you want to install 32-bit or 64-bit windows 10
3.    Then after this you would be ask to select your currency, Language and keyboard pattern(QWERTY)
4.    Then click install to start its installation.
5.    Wait for few seconds.
6.    Then enter your Product Key for using full featured windows 10. Product is present on the cover of DVD.
7.    Accept the license terms and click next
8.    Select `Custom` for installing windows 10 only
9.  Select the drive in which you want to install your windows. Make sure that drive is empty.
    10. Wait until window is installed.
    11. After installation is completed your PC will restart.
    12. Now choose your OS (Windows 10).
    13. Now it will install some features and prepare a desktop for you.


Comments

Popular posts from this blog

Hacking an Facebook ID

Hacking an Facebook ID  There are two methods that are used for hacking Facebook account:        Phishing attack        Token access 1: Phishing attack In phishing attack the attacker downloads the Facebook Login page and then create a database and makes little bit changes in Facebook login page so that victim should login.   The Facebook Phishing page may look like this: Then attacker uploads it to online server or offline server such as Xampp and then creates a tunnel between localhost and Internet to make it available everywhere. The tunnel can be created using ngrok.                Working: The attacker sends it to his victim and when victims login to fake page it redirects it to real Facebook page and the information which user has entered into fake page will be stored in txt file and now hackers can access his/her...

SpyMax malware that targeted Libyan Individuals

Spy Max (Spyware) || Newly found malwares in 2020 || Explained SpyMax: It belongs to surveillance ware family, SpyMax was found targeting Libyan Individuals. It masqueraded as “Corona Live 1.1” to steal photos, media, files, Device location, as well as permission to take pictures and record videos of individuals from infected phone.

Who is Anonymous || Anonymous (The Hacktivists) || Anonymous is in Action

Who is Anonymous || Anonymous (The Hacktivists) || Explained   Anonymous is a decentralized group of Hackers without an identity. They did a first attack in 2003. It has no headquarters so there is no option to join anonymous. They use wrong way to hack but their purpose is to give peoples freedom of speech, Equality and Justice on Internet. Anonymous is basically an idea. They have done many operations and against governments of different countries. The following are some famous operations of Anonymous: ·       OP Dark net (Removed Child Pornography from Dark web) ·       OP Israel (Shutdown approximately 10000 Israeli websites) ·       OP Iran ·       OP Payback Etc. Anonymous uses guy fox masks and there is no way to join the group. Anonymous also had official YouTube Channel. This channel was given by google to Anonymous. Anonymous uploads and tells world the in...