Home > Support > AV & OS Solutions

Quickheal Solutions

How to delete CFR encryption backup if it gets more memory space on hard-disk.

  1. Disabled self protection from setting option of Quick Heal
  2. Go to cfrbackup folder and right click on backup folder then click on properties
  3. Here, in properties you will get option of security tab, click on security tab then at bottom of window advanced button is available, click on it
  4. Then click on Disable inheritance button
  5. Click on Remove all inherited permissions from these objects.
  6. Then check for below entry, if found “everyone” is there with deny type then select it and click on remove button.
  7. After removing it, click on add option, click on “Select a principal” option.
  8. Type everyone in the box then click on the OK button.
  9. Then check “Full control” on the screen below then click on the OK button.
  10. Everyone gets added with allow types in permission section
  11. Then click on Apply and OK option on all open tabs then try to delete cfrbackup folder.

Allow in Proxy Software / Physical Firewall

To know more information about allow access shared Printer / Folder in the network setting in firewall please visit below given link.

Windows Related Solutions

1. How To Boot Into Safe Mode On Windows 8 or 10 (Then Easy Way)

2. Resetting administrator password on Windows server 2008 R2 over Raid

I have locked both my administrator accounts out on my Windows Server 2008 R2 that has Raid.

  • Boot from Windows Server 2008 installation DVD or Pendrive
  • Choose option “Repair your computer”
  • Over RAID – Add Drivers – Find the path of RAID Drivers from PEN Drive.
  • IF Harddisk Drives are detected, Start command prompt C:\
  • CD C:\Windows\System32
  • MOVE Utilman.exe Utilman.exe1 OR  ren utilman.exe1 utilman.exe 
  • COPY Cmd.exe Utilman.exe
  • You may also need to “Enable” the administrator account which can be done by using “NET USER administrator /active:yes”
  • Restart windows
  • At the login screen, type Windows-U, this fires up cmd.exe now
  • NET USER administrator *
  • Type password two times – Command Successfully done.
  • Login as administrator!
  • Now repair computer again and move the original Utilman.exe back”
  • Create another new admin account for security purpose.

3. Some software to help you get software key licenses

Smartphone Security Guide - Your phone and data safely and keep the easiest ways are explained 

You know how important your personal details, photos, emails and location data are for smartphone security and privacy. In today’s tech world our personal photos, data theft and encryption, email hacking, banknote theft etc. are happening more and more through smartphone. Of the 1.4 billion Android users in the world, 99.4 percent are infected with the virus through mobile apps. Smartphones can be handled better by implementing certain security features.

1. Screen lock can be activated (Screen Lock)

The number should not be used after reopening the screen. Personal password digits and codes must be present. Complex pattern lock, biometric fingerprint, face code etc. can also be used. The phone should lock automatically at unused intervals. This applies not only to the mobile device, but also to the laptop or tablet. They use the keylogger virus on computers as well as on smartphones to try to find passwords for emails and bank accounts.

2. turn the mind to (Take care of Apps)

More than one million apps on the Internet are vulnerable to adware and ransomware. Even on Apple computers with advanced security measures, the data of 300 million users has been hacked and destroyed by hackers. Any apps should be downloaded and used only from its official sites. Third-rate apps and games-related apps should be avoided altogether. You can disable the option to allow the installation of third-party apps.

3. Be careful with the mobile web browser (Careful on Mobile Browser)

Disable javascript, pop up. Adblocker can be installed. Advertising sites often use JavaScript, so blocking it can make less use of mobile data. Ads can be placed close to legal content and its vulnerabilities are very high even if you accidentally click on them.

4. Beware of phishing (Careful on Phishing Websites)

Phishing websites look like official websites. Finding a phishing page on your mobile phone is much harder than on your PC or laptop. Phishing techniques can be used to steal money and identity by carrying out cyber attacks. Only strong antivirus software can protect you from phishing and malware attacks.

5.  Enable remote device location (Run Remote device locator).

If your smartphone is lost or stolen, locating it on a remote phone is like installing a dedicated app and confirming the app to help track its location.

6.  Enable automatic backup (Automatic Backup)

Back up automated backups to your cloud on Dropbox, OneDrive, Google Drive, etc. If your phone is lost, destroyed or stolen, your data, contacts and all applications can be taken from the cloud.

These contents does not belong to us. It was subjected to copyright from the Vadivel Zoho Sites

Thendral Enterprise is the one-stop service provider for all your needs around Computer Hardware, Networking, Printers, CCTV and RO.

Opening Hours

[footer-copyrights]