Saturday, 6 December 2014 0 comments

Change Google Logo To Your Own Logo In Google Search

 BY DEEPAK SHARMA

Everyone wants to do something unique from others. You can do so by changing the Google logo and place your own logo in Google search. You can make your own logo image of your own design and can place in Google search by following simple steps.
Chngelogo
Step 1: First of all, you have to add Custom Google Background extension in your chrome browser.
Custom Google Background
Add option
Step 2: After adding, you need to find extension location in your computer,
so follow path
C:UsersYour User NameAppDataLocalGoogleChromeUser DataDefaultExtensions
Step 3: Now Find “jepibmfmhopgkplegmkjgifmhabbjadg” and open it. Now open folder “4.1.3_0″. Now open images. In Images you will see Google logo. Now copy Google logo’s name and then delete it.
Step 4: Now add your logo (364*126) in this folder and Rename it by pasting Google logo’s name.

How To Make A Transparent Logo In Photoshop

First open Adobe Photoshop, in file menu create new and select transparent in contents option. You can select any height and width and hit enter. After making your logo save it in .PNG format.
Make Transparent Logo
Recommended – How To Change Google Search Background
Examples
Change Google Logo (3)

Change Google Logo (4)

If This Post Helpful for You, Then Please Follow:

Change Google Logo (2)
0 comments

How To Add More “Send To” Options In Windows

BY DEEPAK SHARMA

Generally there are only few options in “Send to” option when you select and right click on any file or folder. If there is no option of the file or folder in which you have to send particular file or folder then you will first of all copy the file or folder which you have to send to destination file or folder and then you will open the destination file or folder and then you will paste the file or folder. But this process is too long. So we will provide you a method to add new and more options in “Send to” option. By adding more options in “Send to” option your work will be more easy and you can complete the task of sending an item at your destination in less time.

Step 1:

Open “run” and type “shell:sendto” and hit enter.

RunStep 2:

Now just drag and drop the file or folder which you have to add to “Send to” option to the folder that had opened with the help of step 1.
Add option
That’s it. Now to tally your added files or folders to “Send to” option, you have to just select any file or folder, right click and move cursor to “Send to” option.

If This Post Helpful for You, Then Please Follow:

Send To Destination
Note : You can add options as many as you want to “Send to” option using this method of few steps.
Tuesday, 7 October 2014 0 comments

Common password mistakes

Many people create passwords based on their spouse's name, a hobby, or a simple pattern, since those types of passwords are easy to remember. Unfortunately, they are also very easy for hackers to guess. To create a strong password, you will need to avoid these types of common mistakes.
Review the infographic below to learn some common password mistakes.
Common Password Mistakes infographic
0 comments

Tips for creating strong passwords:

  • Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it easier for someone to guess your password.
  • Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least 12 characters (if the site allows it).
  • If you need to write down your passwords, keep them in a secure place. It's even better if you encrypt your passwords, or just write down hints for them that others won't be able to understand.
  • Don't use the same password for each account. If someone discovers your password for one account, all of your other accounts will be vulnerable.
  • Try to include numbers, symbols, and both uppercase and lowercase letters (if the site allows it).
  • Avoid using words that can be found in the dictionary. For example, "swimming1" would be a weak password.
  • Random passwords are the strongest. Use a password generator instead of trying to think of your own.
  • Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize. You can also choose a sentence that you know you'll remember and then use the first letter of each word in the sentence, plus a few symbols or numbers, as your password.

Using password managers

Instead of writing your passwords on paper where others can easily see them, you can use a password manager to encrypt and store them online. Some password managers can also generate random passwords, making your information even more secure. Examples of password managers include LastPassKeePassFirefox's password manager, and Google Chrome's password manager.
For example, when using LastPass, you will first need to install the LastPass browser plugin. Whenever you type a password on a website, the browser plugin will ask you whether you want to save it. The next time you go to the website, LastPass can automatically enter the password for you. If someone else wants to use your computer, you can simply log out of LastPass to prevent the other person from accessing your information.
Screenshot of LastPass
 
0 comments

What is copyright?

Copyright is the legal concept that works—art, writing, images, music, and more—belong to the people who create them. According to copyright law, any original content you create and record in a lasting form is your own intellectual property. This means other people can't legally copy your work and pretend it's their own. They can't make money from the things you create either.
You can still cite and refer to other sources (including copyrighted materials) in your work. But to use, copy, or change a copyrighted work, you need permission from the person who holds the copyright. This permission is called a license.
Although everyone has the right to require that others respect their copyright and ask permission to use their work, some people and organizations choose to license their content more freely. They do this by giving their work a Creative Commons license, or by placing their work in the public domain.
Review the infographic to get an overview of the differences among traditional copyrightCreative Commons, andpublic domain.
Traditional Copyright: Work cannot be used, adapted, copied, or published without the creator's permission. What does it apply to? All original work is protected under copyright when it's created. Creative Commons: Work may be used without permission, but only under certain circumstances. Creators set rules for the way their work is used. What does it apply to? Only work that creators have chosen to designate as Creative Commons. Public Domain: Work can be used, adapted, copied, and published, completely without restrictions, no permission needed. What does it apply to? Work published prior to 1923, work by long-dead creators, and work that creators have placed in the public domain.
Page 2

Obtaining free content

If everything on the Internet belongs to someone, how do you obtain images, music, and other materials you can use in your projects for free? The answer is through public domain and Creative Commons-licensed content. To learn more, review the tips below.

Tip #1: Use public domain content

There are no restrictions on using works that are in the public domain, which means you can use them however you want—short of claiming that you created them yourself. Unfortunately, it's not always easy to tell whether or not something is in the public domain. There may be some cases when you know for sure that a work is public domain (for instance, if you find a photo or text you are sure was published before 1923), but for the most part the best way to find public domain content is to search for it specifically.
For help finding public domain content, visit these resources:

Tip #2: Use Creative Commons content

The symbols for Creative Commons licenses
Although Creative Commons content won't cost you any money to obtain, it's not totally free: To use it, you must follow certain rules. People who choose to make their content Creative Commons can choose one or more of these licenses to apply to their work:
  • Attribution: You must credit the creator in order to use, copy, or share the content.
  • Non-Commercial: You can't make a profit from the content.
  • No Derivative Works: You can't change the content.
  • Share Alike: You can change the content, but you have to let other people use your new work with the same license as the original. You can't treat any Share Alike work that you adapt as your own copyright, even if you radically change it.
For help finding Creative Commons content, try these resources:

How to tell if content is Creative Commons

To tell if a piece of content is Creative Commons, look for the Creative Commons symbol , as well as symbols that indicate exactly which licenses apply to it. For instance, the symbols in the example below indicate that the photo has three licenses: IconAttributionIcon Non Commercial, and Icon No Derivative Works. This means you can use this photo if you credit the person who created it, don't make money from it, and don't change it.
Creative Commons license information for a photo

Finding content with Google

Google allows you to filter your search results to only show Creative Commons and public domain works. When conducting an advanced search, you can choose which usage rights you want Google to search for. For example, if you're searching for an image to use in your blog, you can change the usage rights to free to use or share.
Screenshot of Google search
For more information on conducting an advanced search, review our Advanced Search Strategies page.
Page 3

Using copyrighted material

The copyright symbol
As you learned earlier, you generally need to license copyrighted material in order to use it, which often costs money. The exception to this is a rule called fair use. Fair use means you can use copyrighted material without a license only for certain purposes. These include:
  • Commentary
  • Criticism
  • Reporting
  • Research
  • Teaching
You can't just grab a copyrighted photo and use it on your blog because you think it's pretty. However, it probably would be considered fair use if you included the photo in a blog post that commented on and analyzed the photographer's work.

Guidelines for fair use:

  • A majority of the content you create must be your own.
    To return to the example above, it's probably fair use to include a few relevant photos to support your ideas in a blog post, presentation, or research paper. However, using these same photos in a project with only a few lines of commentary mightnot be fair use. As another example, let's imagine you found a useful tutorial you wanted to feature on your blog. Including one tip from the tutorial would be fair use. Simply republishing the entire tutorial would not be fair use, even if you linked to the original source.
  • Give credit to the copyright holder.
    In order for something to be fair use, you must give full credit to the person who created it. This includes the creator's name, as well as other information that will help people find the original work or source. For example, if you adapt a recipe that was originally published on a cooking website, you should include a link to the original page. For more help citing your sources, review Avoiding Plagiarism.
  • Don't make money off of the copyrighted work.
    In general, it's much easier to claim fair use when you're using the copyrighted material for noncommercial purposes. While posting images of your favorite TV shows and adding funny captions and commentary might be considered fair use, selling these images on T-shirts would not.

Misusing copyrighted material

photo of woman thinking
The concept of fair use can be tricky, especially when it comes to creating work you don't intend to post or publish. For example, if you download a series of graphics from a designer's website and use them to create a PowerPoint template for you and your coworkers (without permission), you could argue that it was never meant for the public and that you didn't mean any harm.
In situations like this, it's important to put yourself in the copyright holder's shoes. It's true that he or she will probably never find out about the template. It's also a relatively minor violation because you're just using the graphics around the office.
But how would you feel if you were a graphic designer and learned that people were using your work (your livelihood) in a way you didn't intend? And you're not getting paid or credited for it!
In short, it's better to do what's right than to risk violating copyright and fair use laws. Even if you think what you're doing is not a big deal, the copyright holder may disagree. If someone requests that you remove his or her materials from your work, you should do so immediately. Otherwise, you can suffer serious consequences, including:
  • Having your website shut down if your work is published online—like on a blog—after the copyright holder complains to your hosting service
  • Getting sued by the copyright holder
Page 4

Licensing copyrighted content

If you want to use copyrighted content in a way that doesn't fall under fair use, you'll have to license it in order to get permission to post it. If you're interested in purchasing the rights to use images, video, and other media in your work, you may want to visit the following stock photo sites:

Sharing copyrighted videos

Video-sharing sites like YouTube and Vimeo offer the option to share videos by embedding them. When you embed a video, it automatically creates a link back to the place where it was originally posted. Because the original creator or poster is automatically credited, you don't have to worry about going through any extra steps to give credit.
Be aware that many videos on these sites—particularly videos of TV shows and movies—are in violation of copyright law, and may be removed from YouTube at any time. If a video is removed from YouTube, it will also be removed from wherever you've embedded it. You should never embed a video that you know is breaking copyright laws.
An embedded video from YouTube
Page 5

Protecting your intellectual property

Copyright protects the things you create too. You own the original content you post on your blog, share on your website, or write in your research paper. If people copy or steal your intellectual property, you have the right to try and stop them.

Guarding your content online

The best way to protect your content is to keep an eye out for it elsewhere. These tips can help you determine if someone else has published your work online, like on a website or blog.
  • Use plagiarism search services.
    If you choose to publish your work online, these services will analyze your blog or site, then search for sites with identical content. Copyscape.com is a reputable site with a free plagiarism search.
  • Set up Google Alerts for excerpts of your work.
    Google Alerts is a service you can use to automatically email you when sites post new information about a person, thing, or event. You can create alerts for things you've written by entering a few sentences from your work in the Search Queryfield. (Make sure to use quotation marks.) If that text shows up elsewhere on the Web, you'll receive an email.
    Setting up a Google Alert for a blog post
  • Add watermarks to your images. 
    A watermark is something you add to an image to identify yourself as its creator—usually a symbol or some text. If you choose to share your images online, watermarks make it easy for you and other people to recognize images you created. They also can have the effect of discouraging others from taking your images in the first place. You can easily create watermarks in image-editing programs like Picasa and Photoshop.
    A watermarked image

What to do if you find your content on another site

There are two things you can do if you find your images, text, or other media on someone else's website or blog. First, you cancontact the person who runs the blog or site that took your content. Most blogs list a contact email address, but if you can't find one you can always leave a comment on the offending post. Ask firmly but politely to remove your content (or give you credit if you don't mind sharing it). This can work, especially in cases when the other person didn't realize any wrongdoing had occurred.
If contacting the blogger doesn't work, you may want to file a DMCA takedown request. DMCA refers to the Digital Millenium Copyright Act, a law that's designed to help copyright holders protect their content. Under this law, if a site steals your original content you can complain to that site's service provider. If the service provider finds your complaint valid, it will take down the content.
0 comments

5 Cool Batch Files

In This instructable you will get 5 codes for 5 useful batch things

- Password Generator
- Password Protected Command Prompt
- Website Crasher
- Website Pinger
- PC Cleanup Utilitie
Step 1: Password Generator

This Batch generates number only passwords. You can choose from 1, 5. or 10 passowrds to show...all random

Code:

@echo off
:Start2
cls
goto Start
:Start
title Password Generator
echo I will make you a new password.
echo Please write the password down somewhere in case you forget it.
echo ----------------------------------------­-----------------------
echo 1) 1 Random Password
echo 2) 5 Random Passwords
echo 3) 10 Random Passwords
echo Input your choice
set input=
set /p input= Choice:
if %input%==1 goto A if NOT goto Start2
if %input%==2 goto B if NOT goto Start2
if %input%==3 goto C if NOT goto Start2
:A
cls
echo Your password is %random%
echo Now choose what you want to do.
echo 1) Go back to the beginning
echo 2) Exit
set input=
set /p input= Choice:
if %input%==1 goto Start2 if NOT goto Start 2
if %input%==2 goto Exit if NOT goto Start 2
:Exit
exit
:B
cls
echo Your 5 passwords are %random%, %random%, %random%, %random%, %random%.
echo Now choose what you want to do.
echo 1) Go back to the beginning
echo 2) Exit
set input=
set /p input= Choice:
if %input%==1 goto Start2 if NOT goto Start 2
if %input%==2 goto Exit if NOT goto Start 2
:C
cls
echo Your 10 Passwords are %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%, %random%
echo Now choose what you want to do.
echo 1) Go back to the beginning
echo 2) Exit
set input=
set /p input= Choice:
if %input%==1 goto Start2 if NOT goto Start 2
if %input%==2 goto Exit if NOT goto Start 2

Step 2: Website Pinger

This Batch Pings a website you want and go to it at school

:A
@echo off
Title Website Pinger
color 0e
echo Enter the website you would like to ping
set input=
set /p input= Enter your Website here:
if %input%==goto A if NOT B
echo Processing Your request
ping localhost>nul
echo -------------------------------------------------------------------------------------
echo If you do not clost this in 45 seconds you will go to **ENTER WEBSITE HERE**
echo -------------------------------------------------------------------------------------
ping localhost>nul
echo This is the IP=
ping %input%
set input=
set /p input= If you want to open this adress please enter the IP here:
start iexplore.exe %input%
set input2=
set /p input2=
if %input% exit goto exit
ping localhost -n 45 >nul
start iexplore.exe **ENTER WEBSITE HERE**
exit
:exit
exit


Where it says "**ENTER WEBSITE HERE** put your website...if you dont have one delete both lines

Step 3: Website Crasher


This site is just like the Website pinger but insted of pinging it crashes it with 1000 data non stop

':A
@echo off
Title Website Crasher
color 0e
echo Enter the website you would like to crash
set input=
set /p input= Enter your Website here:
if %input%==goto A if NOT B
echo Processing Your request
ping localhost>nul
echo To end Crashing press CTRL + C
ping localhost>nul
cls
echo ----------------------------------------------------------------------
echo Now Crashing Website...DO NOT CLOSE THIS BOX!! PRESS CRTL + C TO END!!
echo ----------------------------------------------------------------------
ping %input% -t -l 1000

Step 4: Password Protected Command Prompt

This Command Prompt makes a user sign up then sign in to get the command prompt

in the command prompt type "red", "green", or "normal" without quotes and it changes the color


@echo off
:home
title Log in to CMD
color 07
cls
echo.
echo Cmd Accounts
echo =============
echo.
echo [1] Log In
echo [2] Sign Up
echo [3] Exit
echo.
set /p op=
if %op%==1 goto 1
if %op%==2 goto 2
if %op%==3 goto 3
goto error
:2
cls
echo Sign Up
echo ======================================
echo.
set /p newname="Enter new username:"
if "%newname%"=="%newname%" goto inputname
:inputname
cd "%userprofile%\documents"
if exist "cmdacoBin" goto skip
if not exist "cmdacoBin" goto noskip
:noskip
md "cmdacoBin"
goto skip
:skip
cd "%userprofile%\documents\cmdacoBin"
if exist "%newname%.bat" goto namexist
if not exist "%newname%.bat" goto skip2
:skip2
echo set realusername=%newname%> "%newname%.bat"
goto next
:next
echo.
set /p pswd=Enter new Password:
if "%pswd%"=="%pswd%" goto inputpass
:inputpass
cd "%userprofile%\documents\cmdacoBin"
echo set password=%pswd%>> "%newname%.bat"
goto next1
:namexist
echo.
echo The entered username already exists.
echo Press any key to return. . .
pause >nul
goto 2
:next1
cls
echo Cmd Accounts
echo ============
echo.
echo Your account has been successfully created!
echo.
pause
goto home
:1
color 07
cls
echo Cmd Accounts Log In
echo ================================
echo.
Set /p logname=Username:
if "%logname%"=="%logname%" goto 2.1
:2.1
echo.
set /p logpass="Password:"
if "%logpass%"=="%logpass%" goto login
:login
cd "%userprofile%\documents\cmdacoBin"
if exist "%logname%.bat" goto call
if not exist "%logname%.bat" goto errorlog
:call
call "%logname%.bat"
if "%password%"=="%logpass%" goto logdone
goto errorlog
:errorlog
color 0c
echo.
echo Username or Password incorrect.
echo Access denied.
pause >nul
goto home
:logdone
cls
echo Command Prompt
echo ==============
echo.
echo Successfully logged in!
echo.
pause
goto account
:account
cls
cd "%userprofile%\documents\cmdacoBin"
call "%realusername%color.bat"
call "%realusername%.bat"
color %colorcode%
cls
echo.
echo -------------------------------------------------------------------------------
echo %realusername%
echo -------------------------------------------------------------------------------
@echo off
break off
Title Command Prompt
color 0a
cls

echo Type "home" any time to go to the current user profile directory.
echo Type "desktop" any time to go to the current user desktop.
echo.
echo Type help to see list of common commands like cd, rd, md, del,
echo ren, replace, copy, xcopy, move, attrib, tree, edit, and cls.
echo Type [command]/? for detailed info.
echo.
pause
cls

:cmd
echo Directory: %CD%
set /P CMD=Command:
if "%CMD%" == "cls" goto cls
if "%CMD%" == "home" goto home2
if "%CMD%" == "desktop" goto desktop
if "%CMD%" == "red" goto red
if "%CMD%" == "green" goto green
if "%CMD%" == "normal" goto normal

%CMD%
cd C:\
goto cmd

:cls
cls
goto cmd

:home2
cd /d %USERPROFILE%
cls
goto cmd

:desktop
cd /d %SystemDrive%\Users\%USERNAME%\Desktop
cls
goto cmd

:red
color 0c
cls
goto cmd

:green
color 0a
cls
goto cmd

:normal
color 07
cls
goto cmd

Step 5: PC Cleanup Utility

This Batch is my favorate and it will

-Delete Internet cookies
-Delete Temporary Files
-Defrag Disk
-Cleanup Disk

@echo off
title PC Cleanup Utility http://www.youtube.com/user/techki-tv

:menu
cls
echo --------------------------------------------------------------------------------
echo PC Cleanup Utility
echo --------------------------------------------------------------------------------
echo.
echo Select a tool
echo =============
echo.
echo [1] Delete Internet Cookies
echo [2] Delete Temporary Internet Files
echo [3] Disk Cleanup
echo [4] Disk Defragment
echo [5] Exit
echo.
set /p op=Run:
if %op%==1 goto 1
if %op%==2 goto 2
if %op%==3 goto 3
if %op%==4 goto 4
if %op%==5 goto exit
goto error
:1
cls
echo --------------------------------------------------------------------------------
echo Delete Internet Cookies
echo --------------------------------------------------------------------------------
echo.
echo Deleting Cookies...
ping localhost -n 3 >nul
del /f /q "%userprofile%\Cookies\*.*"
cls
echo --------------------------------------------------------------------------------
echo Delete Internet Cookies
echo --------------------------------------------------------------------------------
echo.
echo Cookies deleted.
echo.
echo Press any key to return to the menu. . .
pause >nul
goto menu
:2
cls
echo --------------------------------------------------------------------------------
echo Delete Temporary Internet Files
echo --------------------------------------------------------------------------------
echo.
echo Deleting Temporary Files...
ping localhost -n 3 >nul
del /f /q "%userprofile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\*.*"
cls
echo --------------------------------------------------------------------------------
echo Delete Temporary Internet Files
echo --------------------------------------------------------------------------------
echo.
echo Temporary Internet Files deleted.
echo.
echo Press any key to return to the menu. . .
pause >nul
goto menu
:3
cls
echo --------------------------------------------------------------------------------
echo Disk Cleanup
echo --------------------------------------------------------------------------------
echo.
echo Running Disk Cleanup...
ping localhost -n 3 >nul
if exist "C:\WINDOWS\temp"del /f /q "C:WINDOWS\temp\*.*"
if exist "C:\WINDOWS\tmp" del /f /q "C:\WINDOWS\tmp\*.*"
if exist "C:\tmp" del /f /q "C:\tmp\*.*"
if exist "C:\temp" del /f /q "C:\temp\*.*"
if exist "%temp%" del /f /q "%temp%\*.*"
if exist "%tmp%" del /f /q "%tmp%\*.*"
if not exist "C:\WINDOWS\Users\*.*" goto skip
if exist "C:\WINDOWS\Users\*.zip" del "C:\WINDOWS\Users\*.zip" /f /q
if exist "C:\WINDOWS\Users\*.exe" del "C:\WINDOWS\Users\*.exe" /f /q
if exist "C:\WINDOWS\Users\*.gif" del "C:\WINDOWS\Users\*.gif" /f /q
if exist "C:\WINDOWS\Users\*.jpg" del "C:\WINDOWS\Users\*.jpg" /f /q
if exist "C:\WINDOWS\Users\*.png" del "C:\WINDOWS\Users\*.png" /f /q
if exist "C:\WINDOWS\Users\*.bmp" del "C:\WINDOWS\Users\*.bmp" /f /q
if exist "C:\WINDOWS\Users\*.avi" del "C:\WINDOWS\Users\*.avi" /f /q
if exist "C:\WINDOWS\Users\*.mpg" del "C:\WINDOWS\Users\*.mpg" /f /q
if exist "C:\WINDOWS\Users\*.mpeg" del "C:\WINDOWS\Users\*.mpeg" /f /q
if exist "C:\WINDOWS\Users\*.ra" del "C:\WINDOWS\Users\*.ra" /f /q
if exist "C:\WINDOWS\Users\*.ram" del "C:\WINDOWS\Users\*.ram"/f /q
if exist "C:\WINDOWS\Users\*.mp3" del "C:\WINDOWS\Users\*.mp3" /f /q
if exist "C:\WINDOWS\Users\*.mov" del "C:\WINDOWS\Users\*.mov" /f /q
if exist "C:\WINDOWS\Users\*.qt" del "C:\WINDOWS\Users\*.qt" /f /q
if exist "C:\WINDOWS\Users\*.asf" del "C:\WINDOWS\Users\*.asf" /f /q
:skip
if not exist C:\WINDOWS\Users\Users\*.* goto skippy /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.zip del C:\WINDOWS\Users\Users\*.zip /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.exe del C:\WINDOWS\Users\Users\*.exe /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.gif del C:\WINDOWS\Users\Users\*.gif /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.jpg del C:\WINDOWS\Users\Users\*.jpg /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.png del C:\WINDOWS\Users\Users\*.png /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.bmp del C:\WINDOWS\Users\Users\*.bmp /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.avi del C:\WINDOWS\Users\Users\*.avi /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.mpg del C:\WINDOWS\Users\Users\*.mpg /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.mpeg del C:\WINDOWS\Users\Users\*.mpeg /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.ra del C:\WINDOWS\Users\Users\*.ra /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.ram del C:\WINDOWS\Users\Users\*.ram /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.mp3 del C:\WINDOWS\Users\Users\*.mp3 /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.asf del C:\WINDOWS\Users\Users\*.asf /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.qt del C:\WINDOWS\Users\Users\*.qt /f /q
if exist C:\WINDOWS\Users\AppData\Temp\*.mov del C:\WINDOWS\Users\Users\*.mov /f /q
:skippy
if exist "C:\WINDOWS\ff*.tmp" del C:\WINDOWS\ff*.tmp /f /q
if exist C:\WINDOWS\ShellIconCache del /f /q "C:\WINDOWS\ShellI~1\*.*"
cls
echo --------------------------------------------------------------------------------
echo Disk Cleanup
echo --------------------------------------------------------------------------------
echo.
echo Disk Cleanup successful!
echo.
pause
goto menu
:4
cls
echo --------------------------------------------------------------------------------
echo Disk Defragment
echo --------------------------------------------------------------------------------
echo.
echo Defragmenting hard disks...
ping localhost -n 3 >nul
defrag -c -v
cls
echo --------------------------------------------------------------------------------
echo Disk Defragment
echo --------------------------------------------------------------------------------
echo.
echo Disk Defrag successful!
echo.
pause
goto menu
:error
cls
echo Command not recognized.
ping localhost -n 4 >nul
goto menu
:exit


echo Thanks for using PC Cleanup Utility by Ryan
ping 127.0.0.1 >nul
exit

Step 6: BYE!!!

My pets

 
;