Home Blog

which VPN to choose in 2020? The guide for beginners!

0

Want to know which is the best VPN ? Forget the VPN reviews that you can find here and there, Le Crabe has selected four VPNs for you that meet the essential criteria: security, privacy, speed, price and service.

Did the theprinterdriver help you? Help him back by disabling your ad blocker!


(thanks for the pinch )

Then, if you want to know why I chose these VPNs , you can read the second part of this guide which explains point by point what makes a VPN good and worse and why in the end I think the VPNs I have selected are the best. 😉

The best paid VPNs

Trust.Zone: the VPN with the best quality / price ratio !

If you are on a budget, Trust.Zone is clearly the place for you: impeccable service at an unbeatable price. 👍

Price:
Note: 4

NordVPN: if you want to move upmarket , I recommend NordVPN: up to 6 simultaneous connections, more protocols supported, Android applications, iOS, macOS, Chrome and Firefox for a low price .

And thanks to an impressive number of servers (over 5000), NordVPN will be able to connect you to the least saturated servers, guaranteeing you a secure connection that is accessible and faster!

Price:
Note: 5

ExpressVPN: arguably the best performing VPN service . ExpressVPN invested for network quality and providing the pass upscale strip, which is why we get download speeds ( download and upload ) than those of the competition .

It’s the one I’ve been using for years and it’s the best of the best for me. 👌

Price:
Note: 5

VPN comparison table

Trust.Zone

NordVPN

ExpressVPN

Price (per month) € 3 (1 year)
€ 2.59 (2 years)
€ 6.14 (1 year)
€ 3.50 (2 years)
7,50 € (1 an)
Country Seychelles Panama British Virgin Islands
Bandwidth Unlimited Unlimited Unlimited
Log conservation No No No
Protocols L2TP/IPSec et OpenVPN PPTP, L2TP/IPSec, IKEv2/IPsec et OpenVPN PPTP, L2TP/IPSec, SSTP et OpenVPN
Control channel encryption ( SSL handshake ) RSA-2048 RSA-2048 RSA-4096
Data channel encryption ( SSL Record ) AES-256 AES-256 AES-256
Number of countries 32 62 94
Number of servers 130 5000+ 2000+
Peer-to-peer Authorized Authorized Authorized
Simultaneous connections 3 6 5
Applications Windows Windows, macOS, Linux, Android, iOS, Chrome and Firefox Windows, macOS, Linux, Android, iOS and BlackBerry OS
Router compatibility Yes Yes Yes
Bitcoin Yes Yes Yes
Free try Yes, 3 days Yes, 30 days (satisfied or refunded) Yes, 30 days (satisfied or refunded)
Link Trust.Zone (official site) NordVPN (official site) ExpressVPN (official site)
Note 4 5 5

My opinion :

I scoured all the offers available on the market: ExpressVPN, NordVPN and Trust.Zone meet all the selection criteria. By choosing one of them, you will not be disappointed !

I have been using ExpressVPN for 2 years and highly recommend it . Every time I tried another provider from the same range, I reverted to ExpressVPN. Speed, simplicity and quality of service: it’s perfect! 👍

Did the theprinterdriver help you? Help him back by disabling your ad blocker!


(thanks for the pinch )

The best free VPN

TunnelBear: among the mass of free VPNs, it is the one that respects users the most. No ads, no logging, just a bandwidth limit of 500MB. 👍

You can upgrade to the Premium offer at any time, which does not have the bandwidth limit of 500 MB: TunnelBear subscription at € 4.99 / month (1 year).

Price:
Note: 4

Details on TunnelBear

TunnelBear

Price (per month) 2 Free : 0,00 $ (0,00 €)
Premium : 4,99 $ (4,50 €) (1 an)
Adding advertisements No
Country Canada
Bandwidth Free : 500 MB
Premium : Unlimited (Premium)
Log conservation No
Protocols IPSec/IKEv2 (iOS) et OpenVPN (Windows, Android et macOS)
Chiffrement du canal de contrôle (SSL Handshake) RSA-4096
Chiffrement du canal de données (SSL Record) AES-256
Nombre de pays 20
Nombre de serveurs
Peer-to-peer Refusé
Connexions simultanées 5
Applications Windows, macOS, Android, iOS, Chrome et Opera
Compatibilité routeur Oui
Bitcoin Oui
Essai gratuit Premium Oui, 7 jours
Lien TunnelBear (site officiel)

Mon avis :

Je vous conseille toujours de choisir un VPN payant ! (voir les chapitres suivants)

But if you want to get your hands on it before getting down to business, or if you just need a VPN to access blocked content , you can turn to TunnelBear ! 🐻

Did the Crab help you? Help him back by disabling your ad blocker!


(thanks for the pinch )

Why these VPNs? Explanations!

If you have landed here, you have decided: you want to set up VPN access on your PC to protect your anonymity ! 💪

Yes but there you have it, you quickly realized that there are an immeasurable number of sites that offer their VPN solutions and you do not know where to turn.

 »  What is the best VPN ? » Is this one better than the one I just saw earlier? How to decide between them? Why pay for a VPN when there are free ones?  » 🤯

To crown on all full of sites offer comparative touting some VPN rather than others, and you do not know if you can trust them. 🤔

You feel your head is going to explode and despite you do not know if you can trust all these VPN comparators, in short, you are lost.

Hop hop hop my friend, let’s raise our heads!

By reading the following lines, you will have clear ideas and you will understand why you can trust my selection. You will understand why I selected Trust.Zone , NordVPN and ExpressVPN and why I consider them the best VPNs. ☝️

Ask yourself the right questions

Most people have the wrong questions when choosing a VPN. Here are examples of questions that immediately come to mind, wrongly:

  1. Which VPN is the cheapest (or free)?
  2. Which has the most servers?
  3. Which VPN has the most features?

As much to say to you that if you also ask yourself these questions… you are all wrong. 😜 Here are the (right) questions you should ask yourself when choosing a VPN:

  1. Which VPN offers the best security, the best anonymity?
  2. Can I trust this VPN?
  3. What is the fastest VPN?
  4. Does this VPN have a mobile app for iPhone or Android?
  5. Does this VPN have good customer service in case I have technical issues?
  6. Which VPN has the best value for money?

With these questions in mind, we are well equipped to choose the best VPN possible !

But wait and see… I see that the temptation of free is still in your head! Unhappy 😱 Let me explain why the free is really not a good choice and why you do not want it!

The problem with free VPNs

There is no Good Samaritan in business. There is also no Good Samaritan in the Internet security business. Business is business .

If you get something without paying a single penny , you have to ask yourself how the company offering you the service is making a living. It has to be paid somewhere, especially that for a VPN provider, offering bandwidth is expensive.

When you choose a « free » VPN , here’s what the provider of that VPN does 99% of the time:

  • It severely limits the download speed. You are limited to a certain speed and especially to a certain volume of data per day or per month.
  • It keeps logs of all your internet activity, the sites you visited, the files you downloaded… It sometimes sells these logs to marketing companies (or governments).
  • It inserts additional advertising on the pages you visit, it can even install adware / crapware on your system.
  • It protects (it happens) only your web browser, and not your entire Internet connection.
  • It offers very few features, few servers are offered, and it constantly solicits / attacks you to buy one of their paid solutions.

It cools, doesn’t it? 🙃 Honestly, if I only had one piece of advice for you: go for a paid VPN , you won’t regret it. For around € 5 per month, you will have a quality encrypted Internet connection. I find the amount reasonable given the service provided. 👍

Well, free VPNs can be useful if you want to discover and test the functioning of a VPN before you really start by turning to a paid solution.

Also, if your goal is to bypass censorship of the country you are in or to override geographic restrictions and only for that, then a free VPN will do the trick. However, you should be aware that your privacy will probably not be respected . 😕

If I still had to choose one, I would choose TunnelBear : it is the only provider to offer a free VPN that respects users (but limited to 500 MB).

Choosing a VPN: what not to do

To choose a VPN, do not jump on the one that offers the most features .

A VPN provider can offer a VPN with all the features in the world, that doesn’t mean it works well. Believe me, there are a lot of VPNs that do not work well, not well at all: incessant disconnections, connection to servers random / refused / saturated, connection software that freezes …

You know, anyone can offer a VPN service. Since the software to create a VPN is open source and free, the first of the incompetent can start offering its own VPN service.

Do not blindly throw yourself on VPNs  which are in first positions on Google . The first page at Google is (often) places gleaned through marketing and technical work that has nothing to do with the intrinsic quality of the VPN.

Likewise, don’t be fooled by these VPN comparators : most of them are funded by VPN providers who, in exchange for a few dollars, find themselves propelled into the top 3 VPNs to choose first.

VPN comparison sites are unreliable. 😬

The criteria for choosing the right VPN

The 3 essentials when choosing a VPN provider are: trust, security and reliability 👌

In general, if you want to be sure of your move, choose a  recognized VPN provider , having good press with users . If these VPN providers are popular, there is a reason. They tend to provide a good and reliable VPN, responsive customer service. Because of their popularity, they have a lot to lose if they betray the trust of users with an increasingly slower connection, a buggy application, a new privacy policy frowned upon … The slightest misstep would be dramatic for them.

The popularity of a VPN is a popularity that has been achieved through the satisfaction of several thousand users . It is a guarantee of confidence and a good starting point! 😎 FYI, here are two of the most popular providers: Proxy.sh and Private Internet Access .

But it’s not just the popularity of a VPN provider that counts it’s also a personal choice, you don’t have the same needs as the one who absolutely wants an Android application or the one who wants a server in Hong Kong!

This is why we are going to see the criteria on which you should base yourself in order to choose the VPN that suits you best .

Location of the supplier and its servers

When choosing a VPN provider, it is important to check where the company is based and where its servers are located .

A VPN provider installed, for example, in the United States is subject to United States laws. Some privacy advocates suggest that we should avoid any provider based in a country with laws that require data retention. Others suggest being particularly cautious of countries involved in the Five Eyes (alliance of intelligence services) such as Australia, Canada, New Zealand, the United Kingdom and the United States. United.

Also, it is important to be aware of the location of the servers offered by the VPN provider. Make sure that the latter offers servers suited to your needs. Most people use a VPN to access content that is not accessible in their country of residence.

If, for example, you want to watch videos that are only accessible to US residents, you will need a provider that offers one or more US servers. By being connected to one of these servers, it will be as if you were connected from that country, which will give you access to the multimedia contents of the site which are normally viewable only by the inhabitants of that country.

Encryption protocols

When you visit a VPN provider’s site, you are sure to see terms like OpenVPN, PPTP, IPsec, etc. These are all  encryption protocols . Before installing and configuring your VPN connection, you will need to think about the encryption protocol that you will use. This is a very important point. It is he who will define the  level of security of your Internet connection.

Most VPN providers offer a choice of several protocols. Long story short, see if the provider offers L2TP / IPSec or OpenVPN, which are the two best possible security options right now. The PPTP protocol should be avoided because of its too many vulnerabilities, which can be easily exploited. Same thing for the old L2TP protocol (unlike L2TP / IPSec).

This is the main information that you must remember regarding encryption protocols: favor L2TP / IPSec and OpenVPN , avoid PPTP and L2TP. But I feel you are hungry, you want to know more!

You said it ! What are the characteristics of each of these protocols?

To know everything, see this article:

https://lecrabeinfo.net/vpn-les-protocoles-de-chiffrement.html

Encryption key length

Small reminder on encryption. Encryption is the process that allows data to be encoded, so that only the machine with the correct decoder can be able to read the data transmitted to it. The code and the decoding of this data is done using an encryption key  (this is called symmetric encryption).

Now back to the VPN. From your PC, you send the message “downloads the Windows10.iso file” to the VPN server, which you encrypt using the encryption key. The encrypted message travels over the public network (Internet), it is indecipherable. Thanks to this same  encryption key  that you share with the VPN, the VPN server will decrypt the coded message and will be able to read your message « download the file Windows10.iso ». The principle is the same when the VPN sends you data: it sends you encrypted data and thanks to the encryption key, you can decode and interpret the data sent.

The  length of this encryption key  is an important security parameter. The length of the key determines how long it will take to break it through a brute force attack. As a reminder, a brute force attack consists of trying all possible combinations until you find the right combination. The longer the key, the longer it will take to decipher it . OpenVPN provides for example 128-bit (256-bit) encryption to establish a secure connection between your PC and the server and 2048-bit for secure authentication.

Choose VPN providers that offer at least the 128-bit AES encryption algorithm . You are guaranteed that your key will never be forcibly broken by any program.

privacy policy

If the confidentiality of your data and your activities on the internet is the reason why you chose to have a VPN, then you should pay particular attention to the privacy policy of the VPN provider and in particular its policy concerning logs. (logs of your connections and your activities).

Even if your connection is encrypted and no form of spying wants to see what you are doing, the VPN provider can still keep an eye on your activities. This is why it is important to choose a trusted provider who – as far as possible – does not keep logs of your data. I say “as far as possible” because for a company that provides bandwidth, logs are very useful: it is a way for them to facilitate maintenance and ensure that the network is functioning properly.

If you are extremely worried about your safety, try to find a provider that doesn’t keep anything, really nothing. However, keep in mind that keeping logs does not necessarily mean spying, it is also a way to ensure a stable and fast connection .

The privacy policy varies from one provider to another: some keep temporary logs which they delete regularly, some keep nothing at all while others keep all your connection data.

The supplier’s privacy policy also depends on the country in which the company is located and the laws to which it must be avoided.

i Info:If you’re really concerned about the privacy of your data, you can go even further and find a VPN provider that acceptscryptocurrency payments, like Bitcoin. This will allow you not to provide your payment card details (on which your first and last name appears).

Service: bandwidth, simultaneous connections …

Some providers offer VPN access but with some  limitations . It is important to learn about each of these possible limitations before choosing a VPN:

  • Bandwidth.
  • Access time.
  • Number of simultaneous connections.
  • Blocking of certain services.

Bandwidth

When you subscribe to a VPN offer, everything is not necessarily unlimited . It will be necessary to pay attention to the conditions – generally written in very small – concerning the use of the bandwidth. Today, we are still consuming more bandwidth: playing videos in 1080p, downloading files of several GB… And for a supplier, providing bandwidth is far from being free. This is why some of them limit the amount of data you can download per month.

If you want a VPN to download and send files (legally or illegally) in large quantities, then you will have to be careful that the VPN provider does not limit the amount of data you can download ! Do not choose a VPN that imposes a bandwidth restriction unless the limit is extremely high (multiple TB). Often there is a limitation to allow the supplier to take action against the customer in the event of abuse of the service. If you download for more than 100TB / month, you might get a warning 😀

In general, also remember that using a VPN can slow down your internet connection a bit . So don’t be surprised if you don’t download at 100 Mb / s. 😉


Access time

Some providers limit the time that you can stay connected to their VPN. If you want to have a secure connection 24/7, please choose a provider who offers this functionality.


Simultaneous connections

If you want VPN access on several of your devices (PC, mobile, tablet…), you will need a provider that allows multiple simultaneous VPN connections .

3 simultaneous connections is the union minimum. Also, see if you can use a different server on each of your machines: the PC on a Swedish server, the mobile on a Dutch server … If you need to of course!

i Info:you piuvez configure the VPN client directly on your box (I know that with the Freebox Revolution can do)! Like this, you will not need to configure VPN access on each of your machines. Afterwards, this implies that you will have the same type of connection (same server, same encryption protocol) on each device.

Blocages (peer-to-peer)

Thorny subject! We’re not going to lie to each other, some of us want a VPN to download illegal content (movies, music) without getting caught. And for that, the VPN is the ideal choice .

Before launching your head down, you will have to check if the VPN provider does not block certain protocols or certain services (in particular peer-to-peer ).

The best way to find out is to do a Google search to find testimonials or official statements from the supplier that stipulate whether or not they accept file sharing ( downloading torrents for example).

Mobile applications, OS supported

Surely it is not only on your PC  that you want to be anonymous.

In our ultra-connected society, we all have several devices that are connected to the Internet: laptop, smartphone, tablet … And each of these devices runs on a different operating system: Windows on the PC, Android on the smarphone, iOS on the tablet …

Be sure that the VPN provider offers a solution to connect you to each of your devices  thanks to compatible Windows, Linux, Android, iOS applications …

Price

As I told you in the preamble, it is better to turn to a paid VPN .

VPN providers generally offer several plans: 1 month, 3 month and 12 month subscription. The longer the duration of the subscription, the more attractive the monthly price will be .

A word of advice: start by taking the smallest possible subscription (usually 1 month) to test the VPN . If you are satisfied with the quality of the service offered, you can then opt for the 12-month subscription, which is more attractive. In any case, that’s what I did. 😉

Conclusion

I hope this guide has given you a clearer picture of VPNs and the criteria you should use to choose the one that is best suited to your needs.

What you need to remember is that only a paid VPN can give you a stable, quality encrypted connection with an honest privacy policy and high-end features. For just a few euros a month I’m sure you won’t regret it .

Trust.Zone, NordVPN and ExpressVPN meet all the important criteria that I have listed in the previous paragraphs.

Of course, you can turn to another provider: Proxy.sh, ProtonVPN or even OVPN (among others) also offer a quality service. 👍

create, modify and delete users on Windows

0

netplwiz is a very practical and little-known utility that allows you to manage users on Windows. With netplwiz, you can add, edit and delete users from the system with ease.

theprinterdriver helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Here are the features of netplwiz (network places wizard) :

  • Add user
  • Delete user
  • Modify a user’s group
  • Change a user’s password
  • Disable password entry when Windows starts

netplwiz is available on all versions of Windows: Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 10.

To be able to use netplwiz, you must be logged in with a user account that has administrator rights.

In this tutorial, we will see how to use netplwiz to manage user accounts on Windows.

netplwiz: manage users on Windows

Open netplwiz

  1. Open netplwiz by typing netplwiz in the command Execute.
  2. In the Users tab, netplwiz displays all users on the system and the group to which they belong. This is where you can manage users.
  3. On the Advanced tab, you can manage passwords saved in Internet Explorer or Microsoft Edge, open the Local Users and Groups (lusrmgr) tool, and force users to use the key combination Ctrl + Alt + Delete to log in.

Add user

netplwiz allows to create a new user on the system.

Here’s how to do it:

  1. In the Users tab, click the button Add.
  2. Choose whether you want to create a local account or a Microsoft account. A Microsoft account provides access to more services and features such as installing applications through the Microsoft Store. If you are sensitive to respect for your privacy, prefer a local account.
  3. To create a local user account, click Log in without a Microsoft account (not recommended).
  4. Confirm the creation of a local account by clicking on the button Local Account.
  5. Enter the username, password and password hint for the new user.

Congratulations! You have created a new user account on Windows using netplwiz. 👍

Modify a user’s group (Administrator, Standard user)

netplwiz allows you to modify a user’s group (Standard User group, Administrator group or other). Depending on the group to which he belongs, the user will have more or less rights on the system. The Administrator group has full powers, the Standard User group has restricted rights.

Here’s how to change a user’s group:

  1. Select the user for whom you want to modify the group then click on the button Properties.
  2. Click on the tab Group membership.
  3. Choose the user’s group:
    • Standard user : the user has restricted rights, he cannot install software or modify the configuration of Windows.
    • Administrator : the user has all rights on the system.
  4. Click on OK.

Congratulations! You have changed the group of a user on Windows using netplwiz. 👍

Changing a user’s password

netplwiz allows you to change the password for a local user account.

Tip: it is not possible to change the password for a Microsoft account. The Reset Password button is grayed out for these users.

Here’s how to do it:

  1. Select the user for whom you want to change the password.
  2. Click on the button Reset password.
  3. Enter the new password and click on OK.

Congratulations! You changed a user’s password on Windows using netplwiz. 👍

Delete user

netplwiz allows you to delete a user from the system.

Here’s how to do it:

  1. Select the user you want to delete then click on the button Remove.
  2. Confirm the deletion of the user by clicking on Yes.

Congratulations! You deleted a user on Windows using netplwiz. 👍

Remove password when Windows starts

netplwiz allows a user to automatically log in when Windows starts up by removing the password request at logon.

Here’s how to do it:

  1. Select the user to be automatically logged on when Windows starts.
  2. Uncheck the box Users must enter a username and password to use this computer.
  3. Click on OK.
  4. Enter the password of the user who will automatically log in when Windows starts.

Congratulations! You removed the password when Windows started using netplwiz. 👍

theprinterdriver helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

Resetting a user account password on Windows

0

Have you lost or forgotten the password for a user account on Windows? You’ve come to the right place: I’ll show you how to reset the password for one of your user accounts so that you can access Windows again.

 helped you? Help him back by disabling your ad blocker!

Here are three methods to reset the password for a local user account on Windows:

  • Method 1: using the Rescatux backup USB key . Rescatux allows you to accomplish various rescue tasks, including erasing the password of a Windows user account.
  • Method 2a and 2b: by exploiting a Windows security flaw that allows you to reset the password of any user account from a USB key of a Linux distribution like Puppy Linux (method n ° 2a) or Windows Recovery Environment (method # 2b).
  • Method 3: using the MediCat backup USB key . MediCat is a backup operating system (live CD type) which provides access to a suite of tools for troubleshooting your computer.
  • Method 4: Using the Offline NT Password & Registry Editor program (also known as chntpw), which allows you to erase or change the passwords of any user account by modifying the SAM data (Security Account Manager), the Windows user account database. chntpw is also able to promote a standard account to an administrator account.

The three methods presented to reset a forgotten or lost password work with Windows XP, Vista, 7, 8 and 10.

Method 1: with Rescatux

Rescatux is a rescue USB / CD key for GNU / Linux and Windows that allows you to perform various rescue tasks, including erasing the password of a user or administrator account on Windows.

Here’s how to use it:

  1. Download the ISO from Rescatux.
  2. Create a USB key with Rescatux using the Rufus program:
    Create a bootable Linux USB key (Ubuntu, Debian…)
  3. Start your PC from the USB key containing Rescatux.
  4. Select the language , the keyboard layout and then click the Start button .
  5. In the Rescapp program , click on the Blank Windows password button .

    Note that you can also promote a standard user account to an administrator account by clicking on Promote Windows user to Admin .

  6. Click the Run button .
  7. Select the Windows partition and click OK .
  8. Select the user account for which you want to clear the password.
  9. And There you go ! The user account password has been deleted.
  10. All you have to do is restart your PC and log in with your user account.

Congratulations! You have correctly reset the password for a user account on Windows using Rescatux.

 

Crab helped you? Help him back by disabling your ad blocker!


(thanks for the clip )

Method 2: with utilman.exe

Reset a user’s password thanks to a Windows security flaw …

How it works ?

When Windows starts, an executable file is loaded: utilman.exe. This file provides access to Windows ergonomics options (magnifying glass, visual keyboard, narrator, etc.). It can be started manually by pressing the keys . + U

The technique is to replace the ergonomics options with the command prompt . To do this, we will rename cmd.exe(the command prompt executable file) to utilman.exe. So when we press the keys , it will launch the command prompt instead of the ergonomics options, allowing us to change the password of a Windows user account. + U

Method 2a: via Puppy Linux

Thanks to a USB key / CD from a Linux distribution , we will be able to replace the ergonomic options with the command prompt and reset the password of a user account on Windows.

I advise you to use the Puppy Linux distribution.

It is very light (a few hundred MB) and is more than enough for the manipulations we have to do to reset the password of a Windows user account.

Here’s how to do it:

  1. Download the ISO of Puppy Linux (64 bits: bionicpup64-8.0-uefi.iso / 32 bits: bionicpup32-8.0-uefi.iso) then create a USB key of Puppy Linux:
    Create a bootable USB key of Linux
  2. Start your PC from the USB key containing Puppy Linux.
  3. Select Find /grub.cfg then Start xenialpup64 .
  4. Once Puppy Linux is launched, change the country ( fr_FR French, France ) and the keyboard layout ( fr ), then click OK .
  5. A restart of the X server is necessary to validate the changes. Click Restart X .
  6. Now you need to locate the name of the drive where your Windows installation is located. Look at the bottom of the Puppy Linux desktop, you should see a list of readers ( sda1 , sda2 …). Open each of them until you find the one on your Windows partition (the one with the Program Files, Users, Windows… folders).

    In the example above, the Windows partition is located in / mnt / sda4 .

  7. Launch the console application on the desktop of Puppy Linux and enter the following commands to replace utilman.exewith cmd.exe(replace sda4 with the name of the drive where your Windows installation is located):
    cd /mnt/sda4
    cd Windows/System32
    mv Utilman.exe Utilman.exe.bak
    cp cmd.exe Utilman.exe
  8. Restart your PC.
  9. On the Windows login screen, press the keys to launch the command prompt (instead of the ergonomics options). + U
    launch-home-windows-u-prompt-commands
  10. To reset the password for a user account, type the following command (replace nouveau_mot_de_passewith the password you want to assign to the user account):
    net user "nom_compte_utilisateur" nouveau_mot_de_passe
    change-password-windows-user-cmd
  11. Restore the Windows ergonomics options : restart your PC from the USB key of Puppy Linux, open the Terminal (as we did previously) then enter the following commands:
    cd /mnt/sda4
    cd Windows/System32
    rm Utilman.exe
    mv Utilman.exe.bak Utilman.exe

Congratulations! You have correctly reset the password for a user account on Windows using Linux.

Method 2b: via Windows Recovery Environment (WinRE)

Note: if you want to reset the password for an administrator account and this is the only administrator account on your system, this method will not work . Indeed, in this method, we use the command prompt, and to access it, we need… to connect with an administrator account!

This method therefore works only if you know at least the password of one of the administrator accounts of your system. If not, follow method # 2a with Puppy Linux.

  1. Launch the command prompt:
    • With Windows XP , via the Recovery Console: start your PC on a Windows XP installation USB key then press the key Rto launch the Windows Recovery Console.
      repair-installation-cd-windows-xp

      Enter the number corresponding to the location where your Windows XP installation is located (most often it is 1 ) then enter the password for the administrator account. If you are running Windows XP Home Edition, a password may not have been set. If so, just press the button Entréewhen prompted for the administrator account password.

      console-recovery-windows-xp
    • With Windows 7 and Vista , via System Recovery Options: select Repair computer> your Windows installation> Command Prompt.
      command-prompt-cd-installation-windows
    • With Windows 10 and 8 , via Advanced Boot Options: select Troubleshooting> Advanced Options> Command Prompt.
  2. Go to the drive letter where your Windows installation is located. Please note this is not necessarily the letter C:! To find out which letter corresponds to your Windows installation, enter a drive letter (for example E:) then enter the command dirto list its contents. If you find the files specific to Windows (Program Files, Users, Windows, etc.), you have come to the right place!
    e:
    dir
    Le volume dans le lecteur E s’appelle OS
    Le numéro de série du volume est C016-7234
    
    Répertoire de E:
    
    12/04/2018  01:38    DIR          PerfLogs
    13/06/2018  19:35    DIR          Program Files
    12/04/2018  18:19    DIR          Program Files (x86)
    13/06/2018  13:40    DIR          Users
    13/06/2018  22:11    DIR          Windows
  3. Once you are on the drive containing Windows, move to the folder WindowsSystem32:
    cd Windows
    cd System32
    change-windows-system32-prompt-commands
  4. Create a backup of the file utilman.exe, we will restore it when we have reset the password:
    copy Utilman.exe Utilman.exe.bak
    utilman-copy-prompt-commands-windows
  5. Replace the ergonomics options with utilman.exethe command prompt cmd.exe:
    copy cmd.exe Utilman.exe
    replace-cmd-utilman-prompt-commands-windows
  6. Restart your PC.
  7. On the Windows login screen, press the keys to launch the command prompt (instead of the ergonomics options). + U
    launch-home-windows-u-prompt-commands
  8. To reset the password for a user account, type the following command (replace nouveau_mot_de_passewith the password you want to assign to the user account):
    net user "nom_compte_utilisateur" nouveau_mot_de_passe
    change-password-windows-user-cmd
  9. Restore the Windows ergonomics options : restart your PC, access the Windows Recovery Environment (WinRE), open the command prompt (as we did previously) then enter the following commands:
    cd Windows
    cd System32
    del Utilman.exe
    ren Utilman.exe.bak Utilman.exe
    restore-options-ergonomics-windows-prompt-commands

Congratulations! You have correctly reset the password of a user account on Windows using WinRE.

 

Crab helped you? Help him back by disabling your ad blocker!


(thanks for the clip )

Method 3: with MediCat USB

MedicatUSB is a backup operating system that installs on a USB key and provides access to various tools for troubleshooting your computer.

To reset a Windows password with MediCat USB, follow this tutorial:

Reset a lost or forgotten Windows password with MediCat USB

Method 4: with Offline NT Password & Registry Editor

Offline NT Password & Registry Editor is a program for removing or changing the password of a Windows user account.

How it works ?

Windows stores user accounts and passwords in a database called SAM (Security Account Manager). SAM is one of the components of the Windows Registry.

Offline NT Password & Registry Editor allows you to manage the content of SAM, it is thus able to:

  • remove the password from a user account;
  • change the password for a user account;
  • change the type of an account (switch from standard user to administrator);
  • activate / deactivate a user account.

Here’s how to do it:

  1. Create a CD or USB key with Offline NT Password & Registry Editor:
  2. Start your PC from the USB key / CD containing Offline NT Password & Registry Editor.
  3. When Offline NT Password & Registry Editor starts, press the key Entrée.
    boot-offline-nt-password-registry-editor
  4. Enter the number corresponding to the partition where your Windows installation is located. Look at the partitions found under Candidate Windows partitions found and trust their size or their label to find the correct one, the one where Windows is located.
    select-disk-offline-nt-password-registry-editor
  5. The program asks us what is the path that leads to the Windows Registry. Leave the default choice by pressing Entrée.
    select-registry-offline-nt-password-registry-editor
  6. Press again Entrée to load the SAM database, the Windows security account manager.
    password-reset-offline-nt-password-registry-editor
  7. Press again  Entrée to change the passwords for user accounts.
    edit-user-data-passwords-offline-nt-password-registry-editor
  8. The program now displays all user accounts on the system. For each account, we see its name ( Username ), if it is an administrator account ( Admin ) and if the account is disabled or locked ( dis / lock ). Enter the name of the user account for which you want to delete or change the password, then press Enter. In the example below, I enter the user « The Crab ».
    username-offline-nt-password-registry-editor
  9. You have several choices:
    1. Clear the password for the user account .
    2. Set a new password .
    3. Change the type of account: standard user to administrator.
    4. Unblock and activate the user account.
  10. Choose whether you prefer to erase the password or set a new password for your user account by entering the appropriate number. In the example below, I choose to erase the password by entering the number 1 and then doing Entrée.
    user-edit-menu-offline-nt-password-registry-editor
  11. Come in ! (the exclamation mark) to exit the menu for editing user accounts. Attention the keyboard is in QWERTY: to enter the exclamation mark, you have to press the keys simultaneously .MAJ (⇧) + &
    quit-offline-nt-password-registry-editor
  12. Enter a (as the keyboard is in QWERTY, press the key q) to exit.
    exit-offline-nt-password-registry-editor
  13. Confirm the changes you have just made by entering y and pressing Entrée.
    confirm-offline-nt-password-registry-editor
  14. Exit the program permanently by entering n .
  15. All you have to do is restart your computer by pressing the keys and log in with your user account.Ctrl + Alt + Suppr

Congratulations! You have correctly erased or reset the password for a user account on Windows using the Offline NT Password & Registry Editor.

Reset a lost or forgotten Windows password with MediCat USB –

0

Lost or forgot your Windows password? Have you tried everything but can’t find or reset your user account password? Don’t worry, one last solution exists: MediCat USB stick !

theprinterdriver helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

MediCat is a backup operating system (live CD type) which is installed on a USB key and which allows access to a suite of tools to troubleshoot your computer and perform all kinds of operations on Windows such as … reset lost or forgotten password for a user account.

In this tutorial, we will see how to create a MediCat USB key and how to use it to reset a lost or forgotten Windows password.

Start MediCat backup USB key

  1. Download the ISO of MediCat (mini Windows 10 v19.10).
  2. Create a bootable MediCat USB key with Rufus.
  3. Start your computer from the MediCat USB key.
  4. Wait while MediCat loads.
  5. Change the keyboard layout for French using the keyboard shortcut Ctrl + Tab. A French flag icon should appear in the notification area.
  6. From now on, you have three software to reset the password of a Windows user account:
    • PCUnlocker Enterprise
    • Reset User Account Passwords
    • Windows Password Recovery
Crab helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

Reset Windows password with MediCat

With PCUnlocker Enterprise

  1. Open PCUnlocker Enterprise:
    • on the desktop, double-click Reset User Passwords.
    • in PortableApps, select Reset User Account Passwords.
  2. Select the user account with the password to reset and click Reset Password.
  3. Confirm resetting the user account password by clicking on Yes.
  4. Here, the user password has been deleted!
  5. Restart your computer then log in with the user account. Don’t forget to set a new password!

Congratulations! You have reset the password for a Windows user account using MediCat and PCUnlocker Enterprise. 👍

With [email protected] Password Changer Ultimate

  1. Open [email protected] Password Changer Ultimate by selecting PasswordChanger in PortableApps. On the first screen, click on Next.
  2. Please select Search all volumes for Microsoft Security Accounts Manager Database (SAM) then click on Next. If you want to manually select the partition where Windows is located, select one of the other two options.
  3. Select the SAM file for your Windows installation then click on Next.
  4. Select the user account with the password to reset and click Next.
  5. Check that the box Clear this User’s Password is well checked then click on Next.
  6. Confirm password reset by clicking on Yes.
  7. Here, the user password has been deleted!
  8. Restart your computer then log in with the user account. Don’t forget to set a new password!
Congratulations! You have reset the password of a Windows user account using MediCat and [email protected] Password Changer Ultimate. 👍

Avec Windows Password Recovery Pro

  1. Open Windows Password Recovery Pro by selecting Windows Password Recovery in PortableApps.
  2. Select Windows installation, the user account with the password to reset and click Reset Password.
  3. Click on Yes. Here, the user password has been deleted!
  4. Restart your computer then log in with the user account. Don’t forget to set a new password!

Congratulations! You have reset the password for a Windows user account using MediCat and Windows Password Recovery Pro. 👍

theprinterdriver helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

to create a troubleshooting and rescue USB key

0

MediCat is a software suite that allows analyze and troubleshoot your computer. Thanks to MediCat’s diagnostic and troubleshooting tools, you can intervene on the hard drive / SSD, memory modules, operating system (Windows, Linux), user accounts, etc.

Crab helped you? Help him back by disabling your ad blocker!

 

If your computer can no longer boot from the operating system, MediCat is undoubtedly the best solution for performing a quick and efficient troubleshooting in order to target the problems and correct them to find a functioning computer.

But MediCat does not stop there: data backup and recovery tools, « Live » operating systems, antivirus … and more!

In this tutorial, we will see how to install MediCat on a USB key in order to create a rescue and rescue USB key to be used in case of a problem.

MediCat: presentation

MediCat comes in the form of a disk image write to a USB key to create a « Live » troubleshooting USB key to launch when the computer starts.

This disk image contains all the software that will help you analyze and repair a computer.

MediCat is an alternative to Hiren’s BootCD and Ultimate Boot CD which are also troubleshooting and diagnostic CDs / USB sticks.

MediCat is available:

  • a software antivirus : Malwarebytes
  • software backup and of data recovery : AOMEI Backupper, Acronis True Image, EaseUS Data Recovery Wizard, EaseUS Todo Backup, Elcomsoft System Recovery, Macrium Reflect, MiniTool Power Data Recovery, O&O BlueCon, Symantec Ghost
  • tools for repair boot a computer: Boot Repair Disk, Super GRUB2
  • of Operating systems in «Live» mode: [email protected] Boot Disk, Lubuntu, Mini Windows 10
  • tools diagnostic : HDAT2, SpinRite, Ultimate Boot CD, EasyUEFI Enterprise, MemTest86.
  • software disk partitioning : Darik’s Boot and Nuke (DBAN), AOMEI Partition Assistant, DiskGenius, EaseUS Partition Master, MiniTool Partition Wizard, NIUBI Partition Editor, Parted Magic
  • tools for Reset password a user account: PCUnlocker, Reset Windows Password

Here are some of the features of MediCat:

  • A project that is always active, monitored and updated regularly
  • 100% free
  • Free from viruses, malware or any type of malicious code
  • Customizable, you can modify ISO and menus as you see fit
  • Support for UEFI and Legacy BIOS (CSM)

MediCat 19.10

Until version 19.10, MediCat was available in a version called « Medicat with Mini Windows 10 ».

MediCat 19.10 was a Windows 10-based « Live » operating system on which portable troubleshooting applications (PortableApps) were installed.

MediCat 19.10 with Mini Windows 10

The size of « MediCat with Mini Windows 10 » was only 7,14 Go which allowed it to be installed on most USB keys on the market.

MediCat 19.10 features

MediCat 19.10 is no longer available for download, but your servant makes it available on this page:

Download MediCat USB with Mini Windows 10 19.10

Medicat 20.xx

In version 20, MediCat has been deeply overhauled and is now based on Ventoy, a utility that allows you to run ISO images directly without extraction.

No more portable applications, MediCat is now Ventoy + ISO images containing troubleshooting tools.

MediCat 20.06.1 with Ventoy

MediCat 20 is much more flexible and customizable: you can add, modify and delete ISO of the software that interests you.

The downside is its size: about 22 Go !

A USB key of at least 32 GB is therefore necessary in order to install MediCat. If you do not have one, I recommend the SanDisk Ultra USB key which is efficient and offered at a low price.

To create a USB key with MediCat 20, you will need:

  • Have a USB key of at least 32 GB
  • Download MediCat via Google Drive, MEGA or BitTorrent (recommended)
  • Use the imageUSB software to write the medicat.img file on the USB key and create the MediCat USB key

To find out more, go on!

Crab helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

Create a Medicat troubleshooting USB key

To create a MediCat rescue and rescue USB key, follow these instructions:

  1. Download MediCat 20 via Google Drive, MEGA or BitTorrent. I recommend that you download MediCat via torrent, which is more convenient and faster.
  2. Wait while MediCat 20 downloads.
  3. When the download is complete, open the destination folder. You will find the MediCat image (medicat.20.xx.img), changelog, hashes and imageUSB software.
  4. If you have downloaded MediCat from Google Drive or MEGA, you will find an archive divided into several parts: medicat.20.xx.7z.001, medicat.20.xx.7z.002, […]

    In this case, download and install 7-Zip then right click on the file medicat.20.xx.7z.001> 7-Zip> Extract here to get the file medicat.20.xx.img.

  5. Check the integrity and fingerprint of the medicat.20.xx.img file to be sure that it is not corrupt. The fingerprints are available in the Hashes folder.
  6. Run the software imageUSB located in the INSTRUCTIONS> ImageUSB folder.
  7. In imageUSB, check your USB key (Step 1) and select Write image to USB drive (Step 2).
  8. Click on Browse to select the medicat.20.xx.bin file (Step 3).
  9. Click on the button Write then twice on Yes to start the creation of the MediCat USB key.
  10. Patent during the creation of the Medicat USB key.
  11. Once the Medicat USB key has been created, proceed to the next step.
Crab helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

Use the MediCat troubleshooting USB key

Have you created your MediCat USB key? Perfect !

To use it, it’s very simple:

  1. Restart your computer, open it start menu (boot menu) then boot from the Medicat USB key.

    If you need help, follow these tutorials:
    Start your PC from a USB key or CD / DVD List of keys to access the BIOS / UEFI (Acer, Asus, Dell, Lenovo, HP…)

  2. The MediCat start menu will appear: all you have to do is run the diagnostic or troubleshooting tool that interests you.
  3. For example, you can start PC Unlocker in « Password Removal » to Reset password a Windows user account.

Congratulations! You have created a rescue and rescue USB key with MediCat. 👍

Transfer your Android photos to your PC via Bluetooth

0

Tired of pulling out that old USB cable to transfer photos from your Android smartphone to your Windows PC? Do you want to be free and send any file from your smartphone to your PC whenever you want?

Crab helped you? Help him back by disabling your ad blocker!


(thanks for the clip )

Then Bluetooth technology is your gateway to happiness. 🙂

I’m not going to make you the affront to explain to you what Bluetooth is, you already know it. Wireless personal network technology, Bluetooth makes it possible to transfer data from one device to another, without cables. I just told you that I was not going to explain it to you but I just did it … Anyway!

In this tutorial, we will see how to transfer files from an Android smartphone to a Windows PC using Bluetooth with ease!

Even if you have a different mobile (iPhone) or a different operating system (Windows 7, Windows 8.1, etc.), don’t worry, the method is essentially the same.

Transfer Android files to PC via Bluetooth

Step 1: activate Bluetooth on the PC (Windows)

First step, activate the Bluetooth connection on the PC:

  • On Windows 7 : after installing the Bluetooth drivers on your PC, Bluetooth is permanently active, you do not need to activate it manually.
  • On Windows 8 : open Settings> Change PC settings> Wireless> Bluetooth and click the Bluetooth button.
  • On Windows 10 , follow these instructions: how to turn on Bluetooth on Windows 10.
activate-deactivate-bluetooth-windows-10-bluetooth-active

Step 2: activate Bluetooth on the smartphone (Android)

To activate Bluetooth on your phone , do the following:

  1. Swipe down from the status bar to open the notifications panel.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-open-zone-notifications-android
  2. Press the Bluetooth button .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-activate-bluetooth-android
  3. It’s good: Bluetooth is activated on your smartphone.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-android-bluetooth-active
  4. Go to the next stage.

Step 3: pair PC and smartphone

Once Bluetooth is activated on both the Windows PC and the Android smartphone, we have to pair them:

  1. On your Android smartphone, open Settings .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-settings-android
  2. Go to the Bluetooth section .
    send-transfer-files-photos-mobile-phone-to-pc-windows-open-bluetooth-settings-android
  3. Your PC should appear in the Devices section . If not, click the Refresh  button to search for nearby devices.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-android-search-devices
  4. Once your PC is detected, click on its name (PIERRE-RENNES in the screenshot below) to start  pairing .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-twinning-android-pc
  5. An association request window opens with an association code . This ensures that it is your smartphone that requests the connection to your PC.
  6. Click the Connect button .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-android-association-mobile-pc
  7. Return to Windows. An Add Device notification should appear. Click on it.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-add-device
  8. The PIN code of the device requesting the connection is displayed. Make sure it is the same number as the one displayed on your phone. If so, click Yes .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-compare-secret-code
  9. It’s good: your PC and your smartphone are now linked via Bluetooth .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-connect-settings-bluetooth-delete-device
  10. You can delete the pairing at any time by clicking on the Delete device button . You can also do it directly from your mobile.
  11. Go to the next stage.

Step 4: Send Android files (photos, videos) to PC

To send files from our Android smartphone to our PC, we have to put Windows in the « receive files » position .

You cannot send files from your Android smartphone if Windows is not in this « receive files » position.

Here’s how to do it:

  1. On Windows 10, go to Settings then click the Send or receive files via Bluetooth link .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-send-receive-files-bluetooth
  2. Click on Receive files .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-receive-files
  3. You can also do this from the notification area . Click the arrow to display all the icons in the notification area.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-fleche-zone-notification

    Then right click on the Bluetooth icon and select Receive file .

    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-notification-area-receive-a-file
  4. Windows is now waiting for a connection , ready to receive data.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-wait-connection
  5. Return to your Android smartphone. Select the files you want to send and press the Send button .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-mobile-photos-send
  6. Press the Bluetooth button .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-mobie-share
  7. Then select your PC by clicking on its name.
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-mobie-share-choose-device
  8. On Windows as on Android, the transfer of your files begins .
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-reception-files-mobile
  9. And now, your files have been transferred from your Android smartphone to your PC !
    send-transfer-files-photos-mobile-phone-to-pc-windows-bluetooth-reception-files-mobile-finished

Congratulations! You have transferred your Android files, photos or videos to your Windows PC via Bluetooth. 👍

Crab helped you? Help him back by disabling your ad blocker!

The 4 best torrent software (BitTorrent clients)

0

BitTorrent is a data transfer protocol peer-to-peer (P2P) which allows you to download and share files with other users worldwide via the Internet faster and more effectively.

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Unlike the HTTP protocol where the download is provided by a single distributor that can cause overloads and slowness, with the BitTorrent protocol the download and file sharing is done decentralized : All users who download a file share the parts of the file they have downloaded with other users, thus creating a virtuous circle.

No more queues or saturated servers: availability is immediate, downloads are faster.

How do I download a file via BitTorrent?

To download a file via BitTorrent, you need two things:

  • A client BitTorrent.
  • The .torrent file of the file you wish to download. The .torrent file contains the IP address of the BitTorrent tracker which helps communication between the seeders – those who share the file – and the leechers – those who download the file. You can also recover the lien Magnet magnet: of the file (if available), it performs the same function as the .torrent file.

There are a plethora of BitTorrent clients but what is the best software to download these precious torrents?

In this guide, we will see the 4 best torrent software (BitTorrent clients) preferred !

Ranking of the best BitTorrent clients

N°1 : qBittorrent

qBittorrent is a cross-platform, lightweight and open source BitTorrent client available on Windows, macOS, Linux, FreeBSD and OS / 2.

If you are looking for the BitTorrent client the most complete, choose qBittorrent.

qBittorrent on Windows 10
  • Clear and easy to use user interface
  • No advertising
  • Integrated search engine (simultaneous search on many Torrent search engines)
  • Many BitTorrent extensions supported: Magnet links, DHT (Distributed Hash Table), PEX (Peer Exchange), LSD (Local Service Discovery), private torrents, encrypted connections…
  • Remote control via web interface
  • Sequential download (read files being downloaded)
  • Advanced torrents, trackers and peers control (queue, prioritization)
  • Bandwidth control
  • Torrent creation tool
  • IP filtering (compatible with eMule and PeerGuardian formats)
  • Compatible IPv6
  • UPnP and NAT-PMP port forwarding
  • Available on all platforms in ~ 70 languages
Options de qBittorrent

Download qBittorrent

N°2 : Transmission

Transmission is another open source BitTorrent client, extremely light and very easy to use, available on Linux, macOS, Windows and embedded systems.

If you are looking for the BitTorrent client the lightest and simplest, choose Transmission.

Transmission on Windows 10
  • No advertising
  • Minimalist and easy to use interface
  • Nothing to configure: everything is configured by default so that downloads and uploads work right away
  • Transmission uses less CPU and RAM than any other BitTorrent client. It even uses less CPU than some torrent clients without GUI
  • Advanced features: encryption, web interface, peer exchange, Magnet, DHT, µTP, UPnP and NAT-PMP links, port forwarding, download and upload speed limitation, etc.
Transmission Options

Download Transmission

N°3 : Deluge

Deluge is another lightweight, free, cross-platform BitTorrent client available on Linux, Windows, and macOS.

It’s a alternative interesting to qBittorrent and Transmission.

Unfortunately, the latest versions 2.0.x are currently only available on Linux. On Windows and macOS, we must for the moment be content with version 1.3.15.

Deluge sur Windows 10
  • No advertising
  • Three user interfaces available: GTK interface for desktop environments (Windows, Linux, macOS), web interface for web browsers (Firefox, Chrome) and command line interface
  • All the advanced functionalities are available: jamming of the protocol, DHT, discovery of peers in the local network (LSD), exchange of peers (PEX), UPnP, NAT-PMP, global speed limit and by torrent…
  • Many plugins are available to get the most out of Deluge and extend its functionality, developed by members of the Deluge community.
Options de Deluge

Download Deluge

N°4 : Tixati

Tixati is a 100% free, simple and easy to use BitTorrent client, available on Windows and Linux.

Tixati uses download algorithms which in some cases allow you to download faster.

Rather reserved for experienced users, Tixati is an ultra-complete BitTorrent client which allows you to configure the BitTorrent network and transfers to little onions.

Tixati on Windows 10
  • No spyware, no ads
  • Advanced configuration to configure your BitTorrent client perfectly
  • Ultra-efficient peer throttling / unblocking algorithms that guarantee the fastest downloads
  • RC4 connection encryption for added security
  • Detailed bandwidth mapping
  • Support for DHT, PEX and Magnet links
  • Easy and quick installation (no Java, no .NET)
  • Advanced features such as RSS, IP filtering, event scheduler
Tixati options

 

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

BitTorrent clients not recommended

The following BitTorrent clients are not recommended:

  • µTorrent 3.x : closed source code, invasive ads, malware-infested installer, some features only available in the paid version.
  • µTorrent 2.2.1 : obsolete (software dating from 2001), makes your PC potentially vulnerable to hackers and malware due to unpatched security holes.
  • BitTorrent Classic : same as µTorrent 3.x (they are the same software). To avoid.
  • Vuze : too heavy, installer infested with malware. If you are nostalgic, turn to BiglyBT which is a fork of Vuze / Azureus.

Crab helped you? Help him back by disabling your ad blocker!

Tutorial et Guide Trojan Remover

0

Trojan Remover is a program for removing trojans and worms.

A 30-day trial version is available for download.

  1. Tutorial et Guide Trojan Remover
    1. Installation de Trojan Remover
    2. First start of Trojan Remover
    3. Liens

Installation de Trojan Remover

You can download ewido from this download page
This version is currently in beta version, which means that it is not finalized, it is not currently advised to use it.
You must also register to download this version.

  • Execute the freshly downloaded file
  • Welcome to the installation program, click on the button Next to go to the next step

Tutorial et guide TrojanRemover

  • You must then accept the license to use, Click on the button I accept the agreement
  • Click on the button Next to go to the next step

Tutorial et guide TrojanRemover

  • You must indicate in which ewido folder will be installed, by default it offers you the folder C:Program FilesTrojan Remover
  • You can modify this path using the button Browse
  • Click on the button Next to go to the next step

Tutorial et guide TrojanRemover

  • You must then choose the name of the menu that will appear in Start / All programs. By default, the ewido networks shortcut is offered to you
  • Click on the button Next to go to the next step

Tutorial et guide TrojanRemover

  • You must then choose the icons that will be added by the installation program.
  • Click on the button Next to go to the next step

Tutorial et guide TrojanRemover

  • Click on the button Install to start copying files.

Tutorial et guide TrojanRemover

  • Files are copied.

Tutorial et guide TrojanRemover

  • Once the copy is complete, the installation program offers you to update the software (recommended) and then start it.

Tutorial et guide TrojanRemover

First start of Trojan Remover

  • A window opens to notify you that the update of the viral definition will be carried out, click on the button OK

Tutorial et guide TrojanRemover

  • A bluish window opens, click on the button at the bottom left Update to start the update
  • If a message indicates a problem connecting to the server, you can change the server from the drop-down menu at the top left.
  • When the update is finished, click on the button Close at the bottom right.
Tutorial et guide TrojanRemover
  • Trojan Remover will start, a window informs you that the software will expire in 30 days.
  • Click on the button Continue to open the software.
Tutorial et guide TrojanRemover
  • Click the Scan button to start the scan.
Tutorial et guide TrojanRemover
  • Trojan Remover recommends that you disable all of your protection and Antivirus software.
  • Click on the button YES to start the scan.
Tutorial et guide TrojanRemover
Tutorial et guide TrojanRemover
  • If an element is detected, a window opens with the possible actions to perform in the lower part:
    • Continue to allow this program to load as normal means that the program can continue to start normally
    • Prevent this program from running by removing its reference remove the program when the computer starts
    • Prevent this program from running, and rename the program file prevents the program from being executed and renames the files (to be certain that it does not start with Windows or your WEB browser).
    • Exclude this file from future scans (no action will be taken on this file): no particular will be performed on the file and it will no longer be scanned during the next scans.

In the case of an infection, I recommend the penultimate action.

Tutorial et guide TrojanRemover
  • At the end of the scan, Trojan Remover may ask you to restart the computer.
  • Click on the button Yes to restart the computer
Tutorial et guide TrojanRemover

Liens

If you still have problems, come post your questions on the forum

Secure your computer and know the threats
Guide de suppression des malwares (SpySherrif, Spyaxe, SpywareStrike, Winbound, etc..)
Specific Spyware / Malware removal tools
Other anti-spyware tutorials

 

4 alternatives to Windows Notepad

0

Notepad has been Windows’ default text editor for over 30 years. Simple and easy to use, it is nevertheless quite poor in functionality despite the recent updates made by Microsoft.

Crab helped you? Help him back by disabling your ad blocker!

(thanks for the clip )

Are you looking for a simple, lightweight alternative text editor?

On this page, we will see the 4 best alternatives to Notepad (Notepad) de Windows.

This selection contains simple, light and fast text editors just like Windows Notepad and which – as their name suggests – make it easier to take notes thanks to the features that one would expect in 2020: tabs, line number, automatic line break, spell correction …

Alternatives to Windows Notepad

N°1 : Notepads

Notepads is a modern and light text editor with a minimalist design.

Based on the observation that most text editors are too heavy or too old, Notepads was created with the aim of offering an extremely fast and modern text editor.

If you are looking for a text editor simple and pleasant to use, choose Notepads.

Notepads
  • Fluent design
  • Tab system
  • Incredibly fast and light
  • Can be launched from the command prompt or PowerShell by typing: notepads or notepads %CheminDuFichier%
  • Support for multi-line writing
  • Preview of Markdown files
  • Differences viewer (to see the modifications made)
  • Instant save of current session
Settings> Personalization in Notepads

Notepads shortcuts:

  • Ctrl + A / T : create a new tab
  • Ctrl + Tab : switch from one tab to another
  • Ctrl + Num (1-9) : quickly switch to the specified tab
  • Ctrl + + / - : zoom in or zoom out
  • Ctrl + 0 : reset default zoom
  • Ctrl + L / R : change the direction of the text (LTR / RTL)
  • Alt + P : preview Markdown file
  • Alt + D : display the difference viewer

Notepads is currently in the development phase but can be used on a daily basis.

Some limitations are currently present:

  • You will not be able to save files in the system folders (Windows, System32…)
  • You will also not be able to open potentially dangerous files (.cmd, .bat…)
  • Large files are not currently supported, the maximum file size is currently fixed at 1 MB

Notepads is a UWP application to install via the Microsoft Store or via winget:

winget install notepads

Download Notepads

N°2 : EditPad Lite

EditPad Lite is a powerful and ultra-versatile text editor with lots of features that make text editing more practical on a daily basis.

If you are looking for a text editor complete with the most features, choose EditPad Lite.

EditPad Lite
  • Tabbed interface for working with multiple files
  • Automatic backup system and backup options that prevent data loss
  • Unlimited Undo / Redo for all open files, even after saving
  • File browser
  • Support for heavy files and long lines
  • Spell checker
  • Syntax highlighting for many types of files
  • Statistics to instantly see the number of paragraphs, words and letters
  • Support for text files using Windows, Linux or Mac encodings and line breaks
  • Full Unicode support, including complex scripts and RTL scripts
  • Powerful search function with support for regular expressions
Preferences> Save Files in EditPad Lite

EditPad Lite is free for personal use.

Download EditPad Lite

N°3 : TED Notepad

TED Notepad is a “Swiss Army Knife” text editor that aims to be as simple as possible.

No cumbersome toolbars or sidebars, but a simple, neat interface with a bunch of features, settings, and text transformation tools just waiting for your keyboard shortcuts and mouse clicks to be used.

If you are looking for a text editor simple, light and powerful, choose TED Notepad.

TED Notepad
  • A real Swiss army knife for your texts and your code: case conversion, withdrawal, quote, tabulation, deletion of empty lines, deletion of duplicate lines, translation of characters, word wrapping…
  • Powerful search and replace function (support for regular expressions)
  • Advanced automatic completion
  • Smart clipboard
  • Line numbers, new lines visible
  • Undo / Redo on multiple levels
  • Automatic backup, recovery and backup of files
  • Template for new files
Settings > File dans TED Notepad

TED Notepad is intended for advanced users who have special needs in terms of text writing. To discover its true power, you will have to learn to master it. But once you have it in hand, you will not be able to do without it!

Download TED Notepad

N°4 : Notepad3

Notepad3 is a fast and light text editor. It consumes very little memory, but is powerful enough to handle most tasks.

It’s a alternative interesting to the text editors that we saw previously.

Notepad3
  • Word auto-completion
  • Conversion of character encoding between different formats (ASCII, UTF-8 and UTF-16)
  • Line end conversion: DOS (CR / LF), Unix (LF) and Macintosh (CR)
  • Undo / Redo on multiple levels
  • Syntax highlighting for many file formats
  • Powerful search and replace function (support for regular expressions)
Crab helped you? Help him back by disabling your ad blocker!
(thanks for the clip )

Tutorial and Guide SpywareTerminator

0

SpywareTerminator is an anti-malware that scans and eradicates spyware from your computer. SpywareTerminator is very effective in removing spyware that other anti-spyware programs generally fail to remove (SpySherrif, SpyFalcon, Adaware.Navipromo, E2Give, SurfSideKick3, etc.)

You can consult the spyware database that SpywareTerminator recognizes.

  1. Tutorial et Guide SpywareTerminator
    1. Installation
    2. First start: The Crawler
    3. Update
    4. Scan your computer
Note : I saw on a lot of forums that we were wondering about the reliability of this product. You should know that SpywareTerminator was once classified as rogue.
This is no longer the case, SpywareTerminator is a reliable tool.
For more information, see this page: SpywareTerminator at spywarewarrior.com

    Installation

    You can download SpywareTerminator from this download page

    • Welcome to the installation program, click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • You must then accept the license agreement
    • Check the option I Accept The Agreement
    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • You must then choose the folder in which the program will be installed, by default C:Program FilesSpyware Terminator. If you want to modify this path, click on the button Browse.
    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • You must then give your email address to complete the installation
    • You must then choose the folder from the menu Start from Spyware Terminator. If you want to modify this path, click on the button Browse
    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • Select the icons that the installer should create, you can leave these options checked.
    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • You get a summary of installation options
    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • The files are then copied.

    Tutorial et guide SpywareTerminator

    • When the copy is complete, you can start SpywareTerminator by leaving the Launch option SpywareTerminator checked
    • Click on the button Finish to complete the installation

    Tutorial et guide SpywareTerminator

    First start: The Crawler

    When SpywareTerminator is started for the first time, the installation wizard starts.

    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • The wizard asks you if you want to activate automatic updates, which is highly recommended.
    • Leave the option Yes, download and install updates automatically (recommended)
    • Click on the button Next to go to the next step

    Tutorial et guide SpywareTerminator

    • The wizard will ask you if you want to activate real-time protection. The latter will scan the files you are trying to open to detect any spyware. In case, you have installed SpywareTerminator only to scan and remove spyware, you can deactivate this option by answering No.
    • Leave the option Yes, download and install updates automatically (recommended)

    Tutorial et guide SpywareTerminator

    • The wizard then offers to install a free antivirus: ClamAntivirus
    • In case you already have an antivirus, it is useless to add another.
    • Check the option No then click on the button Next to go to the next step.

    Tutorial et guide SpywareTerminator

    • The wizard asks you if you want to send information to Spyware Central automatically if an unknown Spyware is installed on your computer.
    • If you have installed SpywareTerminator only to remove spyware from your computer. You can answer no.
    • Click on the button Finish to complete the installation

    Tutorial et guide SpywareTerminator

    • The assistant recommends that you scan your computer once a day and suggests that you schedule an automatic scan at a specific time.
    • If you have installed SpywareTerminator only to remove spyware from your computer. You can uncheck the option Run Fast Scan every day at.
    • You can also start a quick scan now by clicking on the button Run Fast Scan Now, but this is not recommended.
    • Click on the button Close to complete the installation

    Tutorial et guide SpywareTerminator

    Update

    The SpywareTerminator interface is open.
    It is made up of menus on the left but also on the top right.

    First, an update of the viral base should be carried out. This is so that Spyware Terminator detects more spyware, especially the most recent.

    • Click on the Update menu on the left

    Tutorial et guide SpywareTerminator

    • Click on the update button, downloading and installing updates will be done

    Tutorial et guide SpywareTerminator

    • You must then restart the application, click on the button Yes to restart SpywareTerminator
    Tutorial et guide SpywareTerminator

    Scan your computer

    Before launching a scan, it is very strongly recommended perform this in safe mode. To increase your chances of malware eradication. To restart in safe mode: Guide to restart in safe mode

    • To start a scan, click on the Scan menu on the left
    • Click on Full Spyware Scan then down on the button Start Scan NowTutorial et guide SpywareTerminator
    • The scan is then in progress:
      • In the upper part, you get the files being scanned with the percentage of progress of the scan
      • In the lower part, the statistics with the number of scanned files, identified objects and critical objects
    • You can stop the scan by clicking on the button at the bottom right Abort Scan

    Tutorial et guide SpywareTerminator

    • When the scan is finished, you get the report.
    • In the Threats tab, the detected malware appears in a list, note that they are checked to be ready to be deleted.

    Tutorial et guide SpywareTerminator

    • The button view system Report displays a scan report under the notepad, it can be interesting if you are being disinfected via a forum to copy / paste its content.
    • Click on the menu Edition then Select all then Edition / Copier
    • In the forum create a new message and make a right click then paste
    Tutorial et guide SpywareTerminator
    • The tab Safe SW (SW for SoftWare) displays the list of applications detected as being installed on your computer by Spyware Terminator and being legitimate. Click the + in front of each application for information.
    • The tab Unknown SW shows applications detected as being installed on your computer but not recognized by Spyware Terminator, they are not necessarily malware. If the application is recent, it may be unknown by Spyware Terminator and will certainly be included in a future update. However, if you do not know where this application comes from, you can do a search on google to find out if it is legitimate or not.
    Tutorial et guide SpywareTerminator

    Tutorial et guide SpywareTerminator

    • By clicking on the button Remove at the bottom right, Spyware Terminator will delete all the malware and SW you have checked in the different tabs.
    • Delete confirmation windows may appear
    • Note that the Move to button allows
      • move an application / file detected as dangerous in the ignore list so that Spyware Terminator will no longer detect it during the next scan.
      • You can also move items in quarantine, this can be interesting in case you have doubts about an application / file but you prefer not to delete it to be sure that it does not have a harmful impact on the system .

    Items quarantined or in the ignore list can be viewed using the buttons Quarantine and Ignore List on the left, you can remove a file / application at any time.

    Tutorial et guide SpywareTerminator

    • The tab Scan Report displays a report of cleaned items as a list.
    • You can copy this report to the notebook or to a forum. To do this, click on the button at the bottom left Copy To Clipboard then in the notepad or in a new message of the forum, make a click / right then paste

    Tutorial et guide SpywareTerminator