Friday, January 3, 2014

How to Stop Spending Too Much Time Online

How to Stop Spending Too Much Time Online

The Internet can be a valuable resource for education and fun, but how much is too much? Why can't people stop? Here are some tips to help you quit staring at the computer screen and get out and do something productive offline as well as online.

Steps:

* *Figure out how bad it really is*. Take the quiz below, adding up every time you answered "yes". Tally up your points and evaluate:

  * 0-5: Great information coping skills. What's your secret? Please share some tips.
  * 6-10: You have some good skills and a few bad habits. Analyze what's working and not working and fix it.
  * 11-15: You need help. You need to change your mindset and acquire some more information skills.
  * 16-21: It may be too late. Turn off the computer now! You need total immersion.close
Nice job!
  * 2*Do not feel bad about not reading the digital avalanche of email, blog posts, or web content*. You'll never be "caught up" and that's okay. Get what you can get in a reasonable amount of time and don't worry about the rest. The important information will rise to the top. Don't feel guilty about marking everything as read or using the delete button. It can be your best friend.

  * 3*Don't read everything word for word*. Scanning and pattern recognition is a really important skill to have when you need to look at a lot of information. Don't feel that you have to read every blog post of the blogs you're tracking. It helps if you identify what you need to know before drinking from the fire hydrant.

  * 4*Set time limits*. Determine the appropriate amount of online time.

  * Set a frequency for answering blog comments via email, doing outreach, reading blogs, writing posts and other tasks. Set the time of day to check in and a time limit - this is called time boxing. Stick to it; ignore your blog, email, or Twitter until those magic times. The idea is that you don't have to check your email or respond to Twitter or blog posts in real time. Remember to sort and prioritize what is urgent and what is not.
  * Some parental control software includes time control functions that empowers to set the amount of time that a person may spend accessing the Internet or playing games or other computer activities. With programs like EzInternetTimer
 orTimeUpKidz
, you can easily enforce time limits.
  * 5*Know when to turn the computer off and take a walk*. It is important to carve out patches of time to allow for understanding and processing the information you have consumed. This might mean disconnecting electronically on purpose. A scary thought to some, but yes, power down your computer and gadgets and go for a walk. If you feel you have lost your concentration and productivity, it may be due to the stress that you give yourself by staring at a monitor for too long.


  * 1*When you open your email client, does it make you feel anxious about the work that you don't have time to do*?

  * 2*Do you open your email in the morning before making a prioritized to do list and several hours later forget what it was in the first place you wanted to accomplish today*?

  * 3*Do you frequently forget information you need to know*?

  * 4*Do you ever wish the web or social media would just go away*?

  * 5*Do you have email messages sitting in your inbox more than 6 months old that are "pending" further action or unread*?

  * 6*Do you sometimes wish you could read or type faster*?

  * 7*Do you experience frustration at the amount of electronic information you need to process daily*?

  * 8*Do you sit at your computer for longer than an hour at a time without getting up to take a break*?

  * 9*Do you constantly check (even in the bathroom) your email, Twitter or other online service because you are afraid that if you don't, you will become so far behind that you will never catch up*?

  * 10*Is the only time you're off line is when you are sleeping*?

  * 11*Do you feel that you often cannot concentrate*?

  * 12*Are you subscribed to so many blogs that you can't read them and it makes you feel bad*?

  * 13*Do you feel that you have to read word for word all information that comes into your email box or RSS reader or Twitter*?

  * 14*Are you always seeking out additional information from the Internet or friends online to support a decision or complete a project but never processing it all*?

  * 15*Do you get anxious if you are away from the Internet for too long*?

  * 16*Do you open up multiple tabs in your browser and then forget what you were going to do*?

  * 17*Is your email, google docs or hard drive filled with "virtual piles" of information or “drafts” that haven't been processed*?

  * 18*Are you afraid to delete
email or old files because you're afraid you might just need it someday*?

  * 19*Are you unable to locate electronic documents, blog posts, email messages or other online information that you need in the moment without wasting time playing "find the file"*?

  * 20*Do you find yourself easily distracted by online resources that allow you to avoid other, pending work*?

  * 21*When you make it to a games end and you spent all the time you had to play outside you feel really sad*?

How to Use Twitter

            How to Use Twitter

Different social media sites have different uses, strengths, and advantages. Twitter could be called a 'real time social networking' site, a place for sharing information as it happens, and for connecting with others in real time, often resulting in lasting friendships and contacts.

Steps:

* 1*Go to Twitter**.com*[2]
 and sign up for a free account. Do so by entering your name, email address, and desired password in the provided space.

Part One: Tweet and Gather Followers
  * 1*Learn the Twitter lingo and use it appropriately*.[3]


  * Tweet - a Twitter
 single update of 140 characters or less, which can include @Mentions to other users, hashtags
, external links, or simply regular text.
  * Retweet
 or "RT" - taking a tweet from one user and posting it yourself, automatically crediting the source, so that all of your followers can see the tweet. The original retweeting style would take a tweet and re-post it via your own account in the following format: 'RT @(username of person who originally tweeted the tweet you're retweeting): (contents of tweet)'. The current system does away with this format, and instead directly re-posts the tweet, crediting the origin underneath. For example, 'retweeted from @username'.
  * TweetUps
 - Using Twitter to meet with other Twitter folks.
  * Trending Topics (TTs) - "Trending Topics" lists a range of subjects which many users across Twitter are talking about simultaneously. When Twitter first got started, "Trending Topics" were those which were most popular during the span of the entire previous week. But new, more advanced algorithms have now made it easier to detect recent trends, and cite the very latest most-talked-about subjects. These days, the "Trending Topics" list contains things that thousands of people across the whole of Twitter are discussing at any one time. When you click on a Trending Topic in the list, it will bring up a range of tweets, mentioning each matter of interest, and for each Trending Topic there will be up to three 'Top Tweets' highlighted--Those are the tweets in each topic which have been retweeted more than 150 times. You can view a list of trends in your area in the right-hand column of the homepage.
  * Lists - Users can organize the people they follow into lists of businesses or personalities which are related in some way. For example, a user could list all of the NPOs andcharities
 they follow into a single list, for easy reference.
  * Promoted Tweets - A single trending topic which a company or organization can pay to 'trend', as to gain attention and traffic from Twitter users worldwide.
  * 2*Tweet*. If you want to let your followers know what you are doing, type it into the 'What's happening?' text box and then click on the 'Tweet' button. Note that tweets are limited to 140 characters or less; otherwise, the "Tweet" button will go into a minus.

  * As you type, a countdown is offered to help you keep track of the character count of your tweets. The allowed characters are in gray, then the last 10 go red, and then a red minus symbol appears when you are past the zero (0) indicator.
  * 3*Use hashtags*. Prefacing a word with a '#' will create a hashtag. A hashtag makes a certain word easily searchable. For more information on hashtags see the wikiHow article on How to use Hashtags with Twitter
.

  * Some Trending topics will include hashtags, thus making it easier for users to tap into a Twitter-wide conversation regarding a single matter of interest.
  * A prime example of the usage of hashtags can be seen with Major League Baseball, which uses team-name hashtags (#Mets, for example) to pull together lists of in-game tweets, which they display on their website.
  * 4*Gather Followers*
. Your Twitter can be as intimate or as big as you choose. If your goal is to gather lots of followers, though, be sure to keep your posts interesting and relevant. You shouldn't underestimate the power of following others, either—often times if you follow someone they'll follow you back. Finally, give your favorite followers shout outs occasionally. This could be through direct tweets, blogs, or a simple #FF (#FollowFriday) mechanism. This is where you tweet a short list of your key followers who you think would be good for others to follow and include the hashtag #FF, they are generally sent out at the end of the week hence the name. This will often be reciprocated, meaning your name gets circulated. However, #FollowFridays are going out of fashion and many commentators question their worth due to their spam-like nature. A simple RT (re-tweet) can be a very effective way of attracting followers. Re-tweets are a real time affirmation of someone else's statement and is often rewarded with a follow.

  * 5*Check the replies from your followers that are directed at you*. Click '@Mentions' to see if there are any replies to any of your 'tweets'. When tweeting
, using '@' followed by a username (with no spaces) in your tweet will send a mention to the user you choose. For example, '@username' will send a mention to 'username', and the entire tweet will show up in his '@mentions' section.

  * 6*Decide your own style and times for tweeting*. Twitter, like many social media applications, can become addicting
and time-sucking. Make a decision early on about how much time you will devote to it and about how big your "tribe" of followers will be. Avoid worrying about getting heaps of followers; that's competitive rather than relating and it will end up wearing you out. Instead, focus on quality connections and information-sharing and don't get too upset when someone unfollows you; it happens and you can't change it. If you feel Twitter is overwhelming at any time, simply take a break from it and come back later, refreshed.

  * Anthropological and sociological studies have claimed time and again that we can only cope with being part of a tribe of 150 to 200 people.[4]
 Anything more than that and we get confused and lose the intimacy of connection. Keep that in mind when aiming for too many followers!
  * Read How to avoid a Twitter addiction
 and How to defeat a Twitter addiction
 if relevant!
Part Two: Find and Organize People You Follow
  * 1*Figure out who to follow*. You will probably find that you know quite a few people on Twitter. Using the menu tab on your page click on 'Who to Follow', and there are several ways to find people on Twitter, as follows:

  * Use the 'Find Friends' link to find people you know through your various Gmail
, AOL
, MSN
, Hotmail
 andYahoo!
 accounts.
  * Use the 'View suggestions' link for a wide range of possibilities that may, or may not, connect with your interests. (Twitter is also working on personalizing lists of suggested followers, so keep an eye out for the feature.)
  * Use the 'Browse Interests' tab to find people by interest.
  * 2*Look for people from organizations
 that you are in or for those that share a common interest*. There are many business, companies, celebrities, and non-profit organizations on Twitter, ranging from Stephen Fry (@stephenfry) to Greenpeace (@greenpeace).

  * 3*Create lists*. If you're following lots of people, it can get hard to sift through all the tweets. For easy reference, you can organize the people you follow into a list. To add someone to a list, go to their profile. Then, click the person icon in the toolbar and select "Add to List." A menu with your lists will pop up; you can choose to create a new list or add the person to an existing one.

Part Three: Set Up Your Profile
  * 1*Upload a profile picture*. This picture will be displayed with your name across the site. It must be a JPG, GIF, or PNG file and must be smaller than 700 KB. To do so, click on "settings" in the drop down menu below your username. Then click on "Choose File" to select a file from your computer.

  * 2*Add your name, location, and website*. Under your profile picture, you have the choice to enter your full name. Adding a full name allows you to keep a professional aspect regardless of your username. You can also enter a location to let people know where you're tweeting from and link to your homepage or blog if you desire.

  * 3*Work on your pithy 'bio
'*. Make it eye-catching and interesting. Do it just right and it will help you build up followers; people thinking of following you do read the biographies to see if they have reason to follow you. Bear in mind that a biography can be up to 160 characters long, so you'll have to keep it short and to the point. Don't worry about typing your real name or website URL here—those can both be entered separately (as shown in the previous step).



  * 4*Decide whether you want your tweets to be posted to Facebook*. This can give you more view per tweet. If you so desire, click the "Posts your Tweets to Facebook" button at the bottom of the profile page.

  * 5*Edit your language and time zone*. Under the "Account" 

How to Pretend to Hack a Website

How to Pretend to Hack a Website

For a prank, you can pretend to hack a website. The methods given here do not affect the website content; what you change is only visible on your computer. As soon as the pages is refreshed, it will all be back to normal.

Steps:

First Method
  * 1*Go to the page you want to hack*. Wait for it to be loaded fully. If you do it before, it will only edit what has already loaded.

  * 2*Copy this code into the URL bar*:

  * javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0
  * 3*Hit Stop*. If it worked correctly, the links will have turned into a more saturated blue color, and when you click somewhere you'll be able to edit text.

  * 4*Edit*. You can change text by highlighting it and typing. You can stretch or delete images just by clicking on them. Or, you can just highlight the whole page and hit delete.

  * 5*Type the following code to make the page uneditable again*:

  * javascript: document.body.contentEditable = 'false'; document.designMode = 'off'; void 1
  * 6*Once you have made the page uneditable again, left-click in the URL Bar and press ESC*. This will reset the URL to the page you are on, making it look authentic. Or, you can open another tab and go back to the edited page!

Bookmark Method
  * 1*Create a new bookmark*. For the URL put this: --> javascript: document.body.contentEditable = 'true'; document.designMode = 'on'; void 0 <-- Then save the bookmark as (for example) "edit page".
  * 2*Create a second bookmark*. For the URL put this: --> javascript: document.body.contentEditable = 'false'; document.designMode = 'off'; void 1 <-- Save it as (for example) "End Editing".
  * 3*Click on the "edit page" bookmark to edit the page you are on*. Click the "End Editing" bookmark to make the site appear to be authentic.

How to Hack

                How to Hack

Primarily, hacking was used in the "good old days" for learning information about systems and IT in general. In recent years, thanks to a few villain actors, hacking has taken on dark connotations. Conversely, many corporations employ hackers to test the strengths and weaknesses of their own systems. These hackers know when to stop, and the positive trust they build earns them a large salary.

Steps:

Before You Hack

  * 1*Learn a programming language*. You shouldn't limit yourself to any particular language, but there are a few guidelines.
  * C is the language the Unix was built with. It (along with assembly language) teaches something that's very important in hacking: how memory works.
  * Python or Ruby are high-level, powerful scripting languages that can be used to automate various tasks.
  * Perl is a reasonable choice in this field as well, while PHP is worth learning because the majority of web applications use PHP.
  * Bash scripting is a must. That is how to easily manipulate Unix/Linux systems—writing scripts, which will do most of the job for you.
  * Assembly language is a must-know. It is the basic language that your processor understands, and there are multiple variations of it. At the end of the day, all programs are eventually interpreted as assembly. You can't truly exploit a program if you don't know assembly.
  * 2*Know your target*. The process of gathering information about your target is known as "enumeration". The more you know in advance, the fewer surprises you'll have.
Hacking
  * 1*Use a *nix terminal for commands*. Cygwin
 will help emulate a *nix for Windows users. Nmap
 in particular usesWinPCap
 to run on Windows and does not require Cygwin. However, Nmap works poorly on Windows systems due to a lack of raw sockets. You should also consider using Linux or BSD, which are both more flexible, more reliable, and more secure. Most Linux distributions come with many useful tools pre-installed.
  * 2*Secure your machine first*. Make sure you've fully understood all common techniques to protect yourself. Start with the basics — have you found a server hosting a site about illegal or possibly bad activity? Attempt to hack it in any way you can. Don't change the site, just make it yours.
  * 3*Test the target*. Can you reach the remote system? While you can use the ping
utility (which is included in most operating systems) to see if the target is active, you can not always trust the results — it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.
  * 4*Determine the operating system (OS)*. Run a scan of the ports, and try pOf, or nmap to run a port scan. This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action. You can activate OS detection in nmap by using the -O switch.
  * 5*Find a path or open port in the system*. Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered.
  * Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming.
  * An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be brute forced.
  * 6*Crack the password or authentication process*. There are several methods for cracking a password, including brute force. Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software
  * Users are often discouraged from using weak passwords, so brute force may take a lot of time. However, there have been major improvements in brute-force techniques.
  * Most hashing algorithms are weak, and you can significantly improve the cracking speed by exploiting these weaknesses (like you can cut the MD5 algorithm in 1/4, which will give huge speed boost).
  * Newer techniques use the graphics card as another processor — and it's thousands of times faster.
  * You may try using Rainbow Tables for the fastest password cracking. Notice that password cracking is a good technique only if you already have the hash of password.
  * Trying every possible password while logging to remote machine is not a good idea, as it's easily detected by intrusion detection systems, pollutes system logs, and may take years to complete.
  * It's often much easier to find another way into a system than cracking the password.
  * 7*Get "super-user" privileges*. Try to get root privileges if targeting a *nix machine, or administrator privileges if taking on Windows systems.
  * Most information that will be of vital interest is protected and you need a certain level of authentication to get it. To see all the files on a computer you need super-user privileges - a user account that is given the same privileges as the "root" user in Linux and BSD operating systems.
  * For routers this is the "admin" account by default (unless it has been changed); for Windows, this is the Administrator account.
  * Gaining access to a connection doesn't mean you can access everything. Only a super user, the administrator account, or the root account can do this.
  * 8*Use various tricks*. Often, to gain super-user status you have to use tactics such as creating a "buffer overflow", which causes the memory to dump and that allows you to inject a code or perform a task at a higher level than you're normally authorized.
  * In unix-like systems this will happen if the bugged software has setuid bit set, so the program will be executed as a different user (super-user for example).
  * Only by writing or finding an insecure program that you can execute on their machine will allow you to do this.
  * 9*Create a backdoor*. Once you have gained full control over a machine, it's a good idea to make sure you can come back again. This can be done by"backdooring" an important system service, such as the SSH server. However, your backdoor may be removed during the next system upgrade. A really experienced hacker would backdoor the compiler itself, so every compiled software would be a potential way to come back.
  * 10*Cover your tracks*. Don't let the administrator know that the system is compromised. Don't change the website (if any), and don't create more files than you really need. Do not create any additional users. Act as quickly as possible. If you patched a server like SSHD, make sure it has your secret password hard-coded. If someone tries to log-in with this password, the server should let them in, but shouldn't contain any crucial information.

How to Take a Screenshot in Mac OS X

How to Take a Screenshot in Mac OS X

Take a screenshot in Mac os x

If you need to snap a picture of a funny chat conversation, show an expert an error message on your system, create instructions for performing a task, or even contribute to a wikiHow article, a screenshot is the ideal way to show someone exactly what is on your computer screen. Taking a screenshot on Mac OS X is easy, and there are a variety of simple ways to capture just the image you need.

Steps:

Screenshot a Portion of Your Screen
  * 1*Press "Command+Shift+4"*. Your cursor will turn into a small cross-hair reticle.

  * 2*Click and drag your cursor to highlight the area you'd like to take a picture of*. A grayed rectangle should appear where you drag your cursor. If you need to adjust your windows at all, press "esc" to return to a regular cursor without taking a picture.

  * 3*Let go of the mouse*. You should hear a brief camera shutter noise if your computer's sound is turned on. That signals that your screenshot has been taken.

  * 4*Find your screenshot on your desktop*. It will be saved as a .png file named "screenshot" labeled with the date and time.

  * Earlier versions of OS X will save it as "Picture #"—for example, if it's the 5th screenshot on your desktop it will be labeled as "Picture 5".

  * 5*Use the screenshot*. Once you have taken your screenshots, they are now ready to be used as needed. You can attach them to an email, upload them to the Web, or even drag them straight into an application such as a word processor.

Take a Shot of Your Entire Screen
  * 1*Make sure your screen displays exactly what you want to show in your screenshot image*. Ensure all the relevant windows are visible.

  * 2*Press "Command+Shift+3"*. If your sound is on, your computer should make a brief camera shutter noise.

  * 3*Find your screenshot on your desktop*. It will be saved as "screenshot" labeled with the date and time.

  * Earlier versions of OS X will save it as "Picture #"—for example, if it's the 5th screenshot on your desktop it will be labeled "Picture 5".

Save a Screenshot to the Clipboard
  * 1*Press"Command+*Control*+Shift+3"*. This method works exactly like the one above, except the screenshot does not immediately create a file. Instead, the image is saved to the clipboard, the same temporary storage area where your computer remembers the text that you have copied.

  * You can also take a portion screenshot with this method using"Command+*Control*+Shift+4"and dragging your reticle over the appropriate part of your screen, exactly as the portion screenshot method.

  * 2*Use "Command+V" or "Edit > Paste" to paste your image*. Your screenshot image can be pasted straight into any compatible application, such as a Word document, an image editing program, and many email services.

Screenshot of an Open Window
  * 1*Press "Command+Shift+4" and hit "Spacebar"*. The cross-hair will turn into a small camera. You can press Spacebar again to switch back to the reticle

  * 2*Move your cursor over the window you want to capture*. The camera will highlight different windows blue as it moves over them. You can use keyboard commands such as"Command+Tab" to shift through your windows while still in this mode.

  * 3*Click on the window*. The picture of the window you selected will be saved to the desktop by default just like the other screenshot methods.

Grab Utility Method
  * 1*Go to "Applications" > "Utilities"> "Grab"*. This opens the Grab application. You will see the menus shown in the upper left of your screen, but no windows will open.

  * 2*Click the "Capture" menu and choose between the four different options*.

  * To take a picture of your entire screen, click on"Screen" (or just use the keyboard command "Apple Key + Z"). A window will pop up telling you where to click and letting you know that the window will not appear in the shot.

  * To take a picture of a portion of your screen, click on "Selection". A window will pop up instructing you to drag your mouse over the portion of your screen you'd like to capture.

  * To take a picture of a specific window, select"Window". Then, click on the window you'd like to take a picture of.

  * 3*When the new window opens, choose "Save"*. You can also choose "Save As" to give it a different name and/or move it to a more appropriate location, but note that it can only be saved as a .tiff file. Note that the file is not automatically saved.

Altering the Default Location of the Saved Files
  * 1*Create a new folder*. Do so in Finder by going to "File" > "New Folder".

  * 2*Name the folder*. Do so by clicking once on "untitled folder." Enter your desired name into the box, such as "Screenshots".


  * 3*Open a terminal screen*
. This can be found in the finder, under utilities.

  * 4**In the command line, copy"defaults write com"*.apple.screencapture location , making sure to include a space after"location".* *Don’t click Return*.

  * 5*Drag the folder you want into the terminal window*. This will add the new screenshot destination to the command line.

  * 6*Click "Return"*. A new command line will appear.

  * 7*Copy "killall SystemUIServer"into the command line and hit "Return"*. This resets the terminal, allowing the changes to take immediate effect.

  * 8*Be careful not to delete the folder*. Otherwise, you will have to recreate it or redo this process in order to assign a new default location for screenshots.

Additional Methods
  * 1*Use Skitch*
. Skitch will allow you to make basic edits to your screenshots and upload them to the web.

  * 2*Monosnap*
 is a powerful screenshot tool. Take a screenshot, annotate it and upload it to the cloud, save or open in any other r external editor.

  * 3*Use Jing*
. Similar to Skitch, Jing lets you take screenshots and upload them directly to the web. You can also use it to take videos of your screen.

Thursday, January 2, 2014

How to Delete Files That Cannot Be Deleted


How to Delete Files That Cannot Be Deleted

Files may be locked by various reasons. So how to delete those files which, try as you might, you cannot delete? This article will give some ways to help you delete those files

Steps:

*
  *1*Exist the apps which may still use those files*. Files are often still been read or used by some program. If you exist those apps, you will be able to delete the files.

close
He (or she) shoots, he (or she) scores!
  * 2*Restart Computer and then try to delete the file again*. Some apps may hidden in the background, restart the computer is a good way to kill the app and make the file deletable.

  * 3*Log in as Computer administrator and try to delete the file*.

  * 4*Change the file property to be editable and try delete again*.

  * 5*Try anti-virus program to scan the computer if above all failed*.

How to recover deleted photos

HOW TO RECOVER DELETED PHOTOS

How to Recover Deleted Pictures
When you delete pictures on computer running Microsoft Windows or on a memory card, the link to the data disappears, but the data still remains until overwritten by new files. If you act quickly, you may be able to successfully recover deleted pictures on your computer or memory card. If you can't recover deleted pictures on your computer through the Recycle Bin, you can try restoring previously saved versions of the files. To restore deleted pictures on a memory card, however, you'll need to download a photo recovery program.

Use the Recycle Bin to Recover Deleted Pictures on Your Computer

Steps:

* 1*Open the Recycle Bin (found on your desktop or in the Start Menu) and check there for the deleted picture files*.
  * 2*Select the files or folders you want to recover*.
  * 3*Right-click and choose "Restore" from the menu*. These actions will restore the files to their original location prior to deletion.
Restore Previous Versions of Deleted Pictures on Your Computer
  * 1*Pull up the Start Menu and select "Computer" to locate the folder that contained the picture files you want to recover*. Be sure that it is the folder where the files were actually saved, rather than a library.
  * 2*Right-click on the designated folder and, in the pop-up menu, select "Restore previous versions*." If your files were in a folder located in a drive, such as C:\, then select "Restore previous versions" by right clicking on that particular drive.
  * 3*Review the list of previous versions of the folder or files within this folder/drive*. Determine the most recent previous version of the picture files, or the folder containing them, that you want to restore and double-click on it.
  * 4*Move the deleted picture files or folder containing them to a new location on your computer, by clicking and dragging them to that location in the access menu on the left side of the "Computer" window*. Ideal locations for the new save might be a new folder, the desktop or an external hard drive.
Recover Deleted Photos on Your Camera or Memory Card
  * 1*Access a USB port to connect your camera to your computer and recover deleted pictures on your memory card*. Some computers have card readers, allowing you to insert the memory card directly into the computer for this process.
  * 2*Download a photo recovery program for memory cards*. Look for a free program that is an executable file you don't have to install on your computer, such as ArtPlus Digital Photo Recovery, PC Inspector Smart Recovery or the Kingston Memory Card Data Recovery Tool.
  * 3*Run the program by double clicking on the downloaded executable file and clicking "Run*."
  * 4*Choose the drive containing the deleted picture files from the available card reader drives or camera drives in the pull-down menu*.
  * 5*Indicate the location on your computer where you want the recovered files to be stored*. Enter that information in the appropriate location on the program.
  * 6*Begin the restoration process by clicking on "Start*." Depending on the number of deleted picture files you're attempting to restore, the process can take just a few minutes or extend into several hours.