Although this software is Free and easy to use but it has a catch . It doesn’t start automatically when your PC starts which will make trouble when you want to copy file from your friends silently because if you open this software in front of him , it will reveal your bad intension. So before you insert USB drive run this software and press START and it will then run in the background and will not make any sound while stealing Files. Just like a professional theif .
We sometime wish that if someone insert his/her USB Into your pc then its data automatically copy
in to your system in hidden Form.
there is no need of software in this. we will make it possible with the help of some Dos commands.
Lets get started.
Follow the below steps.
1. open cmd
3. type copy con filename.bat
3. now type “xcopy
i: f:copied /h /s /c /q /i” remove ” ”
4. type Exit
4. press f6
5. now it will create a batch file named filename.bat
xcopy is a command which is used to copy file and folder
i: is the name of your pen-drive drive name replace with your drive name
f:copied is the name of folder where you wish to copied data is to be placed replace
with your own folder or path
/h is used to copy hidden files also
Now copy this file into desktop now whenever someone insert his/her USB into your system then click on this file his data is automatically copied into the folder specified by you
Onion Deep Web: Want some top 31 list of onion deep websites, but one question arise what kind of top 31 lists you want of hidden web, wh...
Looking for best best hacking books? We have short listed some of the highly recommended books for beginners and advanced hackers. The ethic...
An The Seafrontier suffered a hole above the water line and damage to the superstructure oil tanker and a bulk carrier have smashed into...
Chad Koczera photographed Shelly Island by drone. A new island has appeared off the coast of North Carolina but people have been warne...
Evil Twin is a kind of Wi-Fi attack which is almost similar to Website spoofing and E-mail phishing attacks. Cyber Attackers can get all...
Renwick Haddow created ‘trendy’ companies and duped investors into thinking they were big successes, authorities in New York allege ...
The bone is believed to be from a Harlan's ground sloth. Pic: LA Brea Tar Pits Workmen digging a new train line had an "amazing...
Hackers use various methods for hacking a facebook account password of victim. Today I tell you what type of methods hackers are using for h...
A prominent Vietnamese blogger has been sentenced to 10 years in prison after being found guilty of distorting government policies and de...
A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly...