• Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

    Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily...
  • miniLock - Open Source File Encryption Tool from CryptoCat Developer

    It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as...
  • A BEGINNERS GUIDE TO HACKING UNIX

      *************  *       A BEGINNERS GUIDE TO:        *  *        ...
  • CASH! CASH! Hacking ATM Machines with Just a Text Message

    As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million...
  • Microsoft Word Zero-Day Vulnerability is being exploited in the Wild

    Microsoft warned about a zero-day vulnerability in Microsoft Word that is being actively exploited in targeted attacks and discovered by the...
  • Snoopy Drone Can Hack Your Smartphones

    The use of unmanned aerial vehicles (UAVS) called Drones is rapidly transforming the way we go to war. Drones were once used for...
  • Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection

    Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts...
  • Introduction to Netcat

    Introduction : So I was messing around on the internet and came across a tool called Netcat.  I've been messing with it for a couple of...
  • Google Nexus phone vulnerable to SMS-based DOS attack

    Google’s Nexus Smartphones are vulnerable to SMS-based DOS attack, where an attacker can force it to restart, freeze, or lose network...
  • Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

    A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability...

Tuesday, 17 September 2013

HOW TO CREATE YOUR OWN RUN COMMANDS ??

I hope you all already know what is a run command. But if don’t, It is a default function provided by windows OS to jump on any software you want to work on. It is like a shortcut to avoid the step by step procedure . Since it is not possible to keep icons of all the programs on the desktop, windows has equipped this RUN command for ease of use.To open the RUN window simply press Windows key and then R key on your keyboard. (i.e. Window+R).
Then type any program name that you want to execute and you are done the program will start running. But the drawback is that there are only few inbuilt programs which can be used via this method. But here I am showing you the trick to create commands that are not built in within the windows and you can run any of the software by typing any keyword you wish to assign to that software.





Here are some Easy Steps to Create your Own Run Command:


STEP 1.

First of all choose the software for which you are going to make custom run command [e.g. I am going to show you the demo of custom run command for Mozilla Firefox]

STEP 2.

Right click on desktop of your system and create a new shortcut as shown in following screenshot.

STEP 3.

A dialog box will appear , asking you path of the shortcut you just created as shown below :

STEP 4.

Click on Browse button and Choose the path of the desired software

[e.g. for Mozilla firefox just browse C:\Program Files\Mozilla Firefox\firefox.exe]

STEP 5.

After completing step 4 simply cick on Next button and give the desired name to that shortcut which you will be using later in Run window.
[e.g . For Mozilla Firefox I am using ff].

STEP 6.


Now click on Finish button. With completion of step 5 an icon of that software will appear on your desktop. It will indicate that the process has been successfully completed and you are almost done.

STEP 7.

Now simply cut and paste that newly created shortcut into your root drive’s window folder.
[e.g. C:\WINDOWS] (you must need administrator privileges to do this.)

STEP 8.

Here you finished all the setup and now ready to run the software.
Simply go to Run and type the keyword you had assigned earlier in setup phase and your software will start executing.
 Thanks for Reading.


No comments:

Post a Comment