Showing posts with label windows7. Show all posts
Showing posts with label windows7. Show all posts
When the touchpad stops working, there are a few things you can do to try and fix it or work around the issue.

Tip: Since some of the settings do require you to navigate the computer using a mouse cursor, for troubleshooting purposes, you can use the Trackpoint on the laptop or connect a PS/2 or USB external mouse to the laptop as a temporary fix. If you cannot get an external mouse to work, see our navigating Windows with the keyboard page for tips on how to use the keyboard to navigate in Windows.

Other USB device

Some USB and PS/2 devices, especially any USB input device (including a computer mouse), can disable the touchpad. As a troubleshooting step, turn off the computer, disconnect all USB devices, then start the computer again to make sure an external device is disabling the touchpad. If this fixes your problem, but the touchpad is disabled again the next time you connect the device, check your touchpad softwaresettings for a setting that can prevent this from happening.

Check mouse settings

First, in the Windows Control Panel, access the mouse settings and verify the touchpad is enabled. Also, you can adjust the sensitivity of the touchpad to work best for your fingers. Check these settings to make sure something was not disabled or adjusted to cause the touchpad to not work.

Check Device Manager

Second, open the Device Manager and check through the device list to find the touchpad. Check to see that it is enabled. If disabled, re-enable it and test the touchpad. If it is already enabled, change it to disabled, then re-enable it again. Sometimes toggling this setting can kick-start the touchpad into working again.

If there are any yellow exclamation marks, red X's or "Other devices" in Device Manager, any of these errors can indicate there is a problem with hardware in your computer that may be causing the touchpad problems.

Check CMOS (BIOS) setup

Make sure the touchpad has not been disabled in the CMOS (BIOS) setup. In the setup, check the hardware device settings and see if the touchpad is enabled or disabled. If disabled, re-enable it, restart the laptop, and test the touchpad.

Software driver issues

If the above options do not fix the problem, the software driver for the touchpad may be corrupted or not updated enough to work correctly. Visit the laptop manufacturer's website and download the most current touchpad driver for your specific laptop model. Install the driver, restart the laptop, and test the touchpad to see if it works.

Hardware defect

Lastly, if the touchpad still is not working correctly or at all, you may need to take it to a computer repair shop and have it fixed. It could require replacement of the touchpad itself or another component in the laptop. If you cannot repair the touchpad, connect and use an external mouse as a workaround.
Windows is sold in the form of DVDs and downloadable ISOs. The Windows DVD can be put into an optical drive for easy installation. However, with the advent of ultra portable devices and tablets that do not have optical drives, installing Windows from the setup DVD becomes a problem. The only solution for these devices is to install Windows from a USB device such as a flash drive.

There are many other reasons why despite having an optical drive, you might want a bootable USB device for installing Windows. One is that installing Windows from a flash drive is a lot faster than that from a DVD. Creating a flash drive for installing Windows is not as simple as copying the setup files to it as it will not be bootable. To make it bootable, you need to use special software.

There are many third party software to create bootable USB devices but given the fact that most people aren't comfortable with third party software, Microsoft has released an application called Windows 7 USB/DVD download tool. Although the program's name makes it feel that it only supports Windows 7, that isn't really the case. It works well for preparing a bootable USB device for installing Windows 8 as well. 

However, if you want to install Windows 8.1 from a USB device, you need to use a third party tool called Rufus, as Microsoft's tool does not support Windows 8.1.
Before you begin, you must make sure that your flash drive has a storage capacity of at least 4GB (8GB for 64 bit). Also, you need to make sure that you have an ISO file of the Windows setup DVD with you. If you do not have the ISO file, then you need to create an ISO file from your setup DVD using a free program like ISOCreator.

See Steps for


1. Windows 8.1
2. Windows 8 and Windows 7

Steps to Install Windows 8.1 from USB flash drive


1. Download Rufus. The program runs perfectly on Windows 8, Windows 8.1, Windows 7, Windows Vista and Windows XP. Also, you need to be in an administrator account.

2. Start the program and locate your USB device in the Device: dropdown.

3. Give a name to your flash drive using the Volume Label option and leave all other settings unchanged. 

4. Check the Create a bootable disk using checkbox if it is not already checked. In the dropdown menu next to it, select ISO image. Click on the small button right to it to locate your Windows 8.1 ISO image.

5. Click on Start to format your USB device and extract all files of the ISO to it. This will delete all data on your USB device so make sure that it does not contain any important files.

6. Now, you need to boot from the USB device you just created to start the Windows 8.1 installation process. If your computer doesn't boot from it, you might need to change the boot order. Also, you must note that older computers won't boot from a USB drive that is formatted as NTFS. To overcome this, you should make sure that your device is formatted as FAT32 and your computer has enough disk space.

Steps to Install Windows 8 and Windows 7 from USB flash drive


1. Install Windows 7 USB/DVD download tool. To install this program, you need .NET Framework version 2.0 or higher. The program runs perfectly on Windows 8, Windows 8.1, Windows 7, Windows Vista and Windows XP. Also, you need to be in an administrator account.

2. Open the program. Enter the location of your Windows ISO file in the source file box. Alternatively, you can browse to it and click Next. If at this step, you get an error saying "Invalid ISO file", you can use an alternate method to make a bootable USB flash drive

3. On the choose media type screen, select USB device to create a bootable Windows installation flash drive.

4. On the insert USB device screen, select your USB flash drive or the external hard drive to which you want to copy the setup files and click Begin copying. If your USB device does not have enough space, you will be shown a dialog box saying so. Click Erase USB device. This will format your USB device and delete all data on it.

Tip: If you accidentally delete the data in your USB device in the previous step, you could still recover it with free tools.

5. If everything goes right, you will see a Bootable USB device created successfully message on the next screen.

6. Now, you need to boot from the USB device you just created to start the Windows installation process. If your computer doesn't boot from it, you might need to change the boot order. Also, you must note that older computers won't boot from a USB drive that is formatted as NTFS which is what the Windows 7 USB/DVD download tool formats it into while you select Erase USB device option. To overcome this, you should make sure that your device is formatted as FAT32 and your computer has enough disk space.

If it complains that it is not a valid ISO file, you need to make sure that your Windows ISO is original and has not been modified in any way. If you are still unable to install Windows from a USB drive, just add a comment.


The "shutdown.bat" file is a batch file that can allow you to auto-launch applications and perform tasks just by opening it up. You can make this batch file do pretty much any Windows function you want, but for this tutorial, we are going to write a script to shutdown the computer. Here's how:

1. Open up "Notepad" by going to Start > Run > "Notepad" and then click OK.
2. In the notepad editor, type in: 
c:\windows\system32\shutdown -s -f -t 00
3. Save the file with .bat to your computer. You can put it pretty much anywhere on your computer. I put mine on my C: drive.

What this batch file does is it points to the shutdown function on your computer, generally located at c:\windows\system32\shutdown. You may want to double check this, as some computers may have it listed as c:\winnt\system32\shutdown. If this is the case, then you want to change your batch file accordingly. The -s tells it to shutdown the computer. The -f tells it to force the computer to shutdown so that it doesn't get hung on any open applications. The -t sets the time for it to wait before it actually shuts down. You can set it to whatever you want, but I put in 00 to set it to zero


paste it to :-C:\Users\"current user name"\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

Note: Replace current user name whith your user name..! without quots..!

With the world going wireless in every sphere of technology, the question of security has often been raised. The same is true for wireless internet networks or Wi-Fi networks with hackers and Wi-Fi intruders always looking for ways to gain access to unsecured networks. There are several reasons why you might want to protect your Wi-Fi network. Prominent among them include better privacy, reduced internet bills and faster internet speeds.This post contains few simple techniques you can use to make sure that your wireless network is as secure as it possible can be.

Protect your Wireless Internet Network

1) Encrypt your Wi-Fi Network: When you use a Wi-Fi network for accessing the internet, every piece of data you send and receive over the air can be easily snooped by anyone with the right set of tools. Packet sniffers can be used by even the most novice of users to sniff your data. This means that a hacker can not only see which websites are you accessing but also get the login details of your personal and professional accounts. 

Encryption basically involves scrambling the data that is transmitted and received by you while using a wireless network. This means that even if a hacker intercepts your data transmission, (s)he will not be able to exploit the information contained within it.

There are two encryption standards available that you can use: WEP (Wired Equivalent Privacy) and WPA (Wireless Protected Access). WEP is the older standard of encryption and can now be bypassed in a matter of minutes. WPA is relatively newer but it still has security holes. AirCrack and coWPAtty are two free tools that allow anyone to easily crack WEP and WPA encryption using bruteforce technique. WPA2 is the latest standard and is what you must use if you want the highest level of protection for your wireless network. The encryption keys used change each time a device accesses the network making WPA more difficult to hack. 

The encryption used by all devices in the network must be the same for the network to work properly. Your network will only be as secure as its least secure device. Make sure all devices you use support WPA2 encryption. Use a strong encryption key. Make sure that it is longer than 10 characters and contains a mixture of capital and small letters, numbers and symbols. Do not use common words and stuff that people can guess about you as your password. 

2) Replace default passwords on your router with strong passwords: The biggest mistake most wireless internet users make is not changing default passwords on their routers. Hackers utilize public databases that contain default passwords and usernames from virtually every manufacturer. This enables them to change the security settings of your router according to their needs. Using a strong password for your router ensures that hackers and miscreants cannot change your network's security settings. To change the password on your router, visit Administration settings on your router's settings page. Also, do not store passwords in browsers as they can be easily made visible.

3) Change default SSID
Your network's SSID or Service Set Identifier is the name of your wireless network. Usually, the SSID is the name of the router's manufacturer along with the model number of the router. Changing it to not display this information prevents you from giving additional information about your router to prospective hackers.

4) Do not broadcast your SSID
Hiding SSID prevents unsophisticated and inexperienced hackers and wifi intruders from determining that your network exists. Hiding your SSID is relatively easy and the option to do so is usually under basic wireless settings on your router's settings page. However, it is important to note that some devices, including those running newer versions of Windows, will show every network even if they cannot identify its name. Moreover, your network will still contain the SSID in data packets making unmasking ridiculously easy with tools like inSSIDer, Kismet and Commview for WiFi. 

5) Use scary names to discourage Wi-Fi theft: If your wireless network has a name like C:\virus.exe, most people who might otherwise access your network will not for the fear of getting their devices infected. You can use your creativity to find more dangerous names for your wireless network.

6) See Connected Devices List: Almost every new router will have a page which displays the list of every device that is connected to the network. You should check this page at regular intervals to see that unknown devices are not leeching your network. When you see an unknown device, you can be certain that someone has breached your network. You can try AirSnare, a free utility which scans your network for unexpected MAC addresses and also looks into DHCP requests.

7) Turn off Guest networking: While most routers will have guest networking disabled by default, it always pays to see that you may not have accidentally enabled it. Guest networking allows others to access your network.

8) Enable MAC address based filtering: Media Access Control or MAC address identifies each device connected to your network. MAC address is an alphanumeric key separated by colons. Enabling MAC address based filtering allows only devices having particular MAC addresses to access your network. You need to enter the MAC address of every device you wish to allow to connect to your network on your router's settings page. This prevents unknown devices from connecting to your network even if they know your password. To find the MAC address of your computer, open command prompt and execute “ipconfig /all” without quotes.

While it may prevent inexperienced users from getting access to your network, experienced hackers and advanced users can use a wireless network analyzer like Nmap and then change the MAC address of his computer with another free tool MAC Shift.

9) Keep your firmware up to date: Router vendors regularly release firmware updates and post them on their websites. You should occasionally check the manufacturer's website to see if a new firmware update has been released. Newer routers will automatically inform you when new firmware is available.

10) Reduce wireless signal range: If you reduce the range of your wireless network, common sense tells that it will prevent hackers located at a distance from detecting your network. This has the advantage that if hackers do not know that a wireless network exists, they will not try to break into it. You can place your router at places which would block the Wi-Fi signals. While this technique is advantageous, a hacker keen on hacking into your network will just have to use a larger antenna to pick up your router's signals. Moreover, reducing the range of your wireless network might cause troubles for genuine users. 

11) When not using your internet network, turn it off: This is self explanatory. If you are not using your network, turning it off saves you from giving extra time to hackers to try and hack into your wireless network. While it may be impractical to turn every device on your network off every time you are not using the network, it still is advisable to do so during extended periods of non use.

If you follow all these techniques, your Wi-Fi network will be a lot more protected and hackers will have a tough time breaking into it.
Have you ever wondered how you can make a folder which neither can be deleted nor be renamed. Well, if you have, then you have come to the right place. With this trick, you will be able to create folders in Windows which cannot be renamed or deleted.

Basic Concept
The basic concept behind this trick is the use of Keywords. Keywords are reserved words in any programming language that cannot be used as names of variables. Windows also uses certain keywords in its programming. Some of them are con, aux, lpt1, lpt2, lpt3, lpt4, lpt5, lpt6, lpt7, lpt8 and lpt9.

A Test
To test this concept, make a new folder in Windows and try to give it a name same as any keyword mentioned above.

Result
Windows will not rename your folder to any of the keyword given above.

Trick
So the question arises, how can we make a folder with a keyword as its name? The solution to this problem is included in Windows itself. As we know that Windows has evolved from D.O.S.(Disk Operating System), its commands can be used in Windows. You can use D.O.S. Programming in Windows to create a folder with a keyword as its name using the steps given below:-

  1. Click on Start.
  2. Click on Run. Type in "cmd" without quotes.
  3. In the Command Prompt Window that opens, type the name of the drive you wish to create your folder in the format : and press Enter. e.g. If you wish to create the undeletable folder in D drive, type "D:" without the quotes. Note that the folder cannot be created in the root of C: drive (if C: is your system drive).
  4. Type this command- "md con\" or "md lpt1\" without the quotes and press Enter. You can choose any of the keywords given above as the name of your folder.

Now Windows will create an undeletable, unrenamable folder in the drive you entered in Step 3. However, the folder can be renamed to another keyword using Windows Explorer.

Deleting the Folder

Although, it is not possible to manually delete the folder, you can delete the folder by typing "rd con\" or "rd lpt1\" in Step 4 instead of "md con\" or "md lpt1\".

Windows Compatibility: This works on Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 8.1.

Try it yourself to create one such folder which can neither be deleted nor be renamed.
Google's engineers love to hide some pretty cool tricks at the most unexpected places. Add to that Google's policy of giving 20% of working time to its engineers to do what they want, and you have a search engine filled with lots of entertaining Easter eggs and tricks.

Sadly, most of these tricks are still a secret, but every now and then, Google employees leak these cool insider pranks and the whole world gets to know about them. Here, I have created a list of all such known Google tricks and Easter eggs that are still "working."




Google in 1998
Search Google for "Google in 1998" and you will be taken to the past to a search results page that shows how Google looked in 1998.

Kerning
Kerning means adjusting the spacing between characters. So, how would you expect Google to describe it? Literally, off course. When you search Google for Kerning, the spacing of the word Kerning is changed as compared to that of other words. This only works with personalized results disabled.

Conway's Game Of Life
Conway's Game Of Life is a game that indicates how cellular life evolves based on the initial configuration. If you search Google for Conway's Game of Life, you will get a results page with the game running in the background.

Jason Isaacs
Just search for Jason Isaacs and Google will return a page saying Hello to him. This only works on Google UK. This is a reference to Kermode and Mayo's Film reviews which greets Jason with hello every week.

Bacon Number {Actor Name}
Kevin Bacon is a famous hollywood actor who was quoted as saying that he has worked with everybody in hollywood or somebody who has worked with them in 1994. This led to many websites being launched about his claim in 2007. Bacon seeing this immense response launched a charitable website called Six Degrees, which is based on a theory that everyone in hollywood has worked with Kevin Bacon through a chain of six acquaintances or less. An actor gets as many degrees as he is distant from Kevin Bacon's movies in terms of people in the chain of acquaintances.

Google too has now involved Six Degrees of Bacon in its search results. For example, searching Google for Bacon Number Johnny Depp gives Depp's Bacon number to be 2.

Google knows how to celebrate the holidays
Searching Google for a holiday will make Google return a page decorated with items representing that holiday. For example, searching Google for Christmas returns a page decorated with Christmas lights. This also works for Kwanzaa, Hanukkah, Halloween and Festivus. These Easter Eggs based on a festival are only activated when that festival is near.

Zerg Rush
Search Google for Zerg Rush and you will see the O's of Google attacking the search results page. They will attacking every result one by one. There is a health bar which indicates how injured a search result is. You can also kill these O's by clicking on them. They also have health bars which indicates their health. You get points on the basis of how many O's you kill. The aim of this game is to beat as many O's as possible.



Askew or Tilt
Ever had the chance of searching Google for Askew or Tilt? If you have, then you already know what comes up. If you haven't, do it now and you will see the search results page literally tilt to give you a better idea of what these words mean. This will work only if you use latest browsers which support HTML5 and CSS3. So, Internet Explorer users, use Firefox, Google Chrome or Safari for a while to use this.

Do a barrel roll
'Do a barrel roll' in its true sense means to do a 360 degree spin. Google takes practical demonstrations way too seriously for this one and literally spins the search results page to give you a clearer idea of the meaning of this phrase. Don't believe me? Go search Google for Do a barrel roll now and see your world turn around.

This Easter egg is apparently a tribute to Star Fox, a video game series developed by Nintendo, because searching Google for Z or R Twice also does the barrel roll, just like in Star Fox. Many bloggers interpreted a lot of different things from this, but Google clarified that this fun trick was created by a Google Engineer solely for the purpose of entertaining users along with showing the power of new HTML5 and CSS3 technologies. Like the previous Easter egg, this will only work in modern browsers.

Binary, Octal and Hexadecimal Number systems
Another one of those literal Google Easter eggs. If you search Google for "Binary", "Octal" or "Hexadecimal" (without quotes) with Search Plus Your World disabled, Google will show the number of results in the same number system. For example, searching Google for hexadecimal will return the number of results like in the image below.


Recursion
The "Did you mean?" feature of Google often helps many users to get to the right results when they type something different from what they intended to search. If you search Google for recursion, the same feature takes you to an endless loop of clicks all linking to the same results page thereby completing recursion, which occurs when something calls itself. Seriously geeky.


Anagram
Another one of those "Did you mean?" Easter eggs. Search Google for Anagram and Google will instantly ask whether you meant "Nag A Ram" which is one of the anagrams of the word "anagram." Google really shows their word-playing skills with this one.

Asking Google to define Anagram makes Google ask if you meant nerd fame again.

ASCII Art
Are you a fan of ASCII art? Google surely is. Search Google for ASCII art and Google will greet you with a search results page having an ASCII version of the Google logo at the place where normal logo should have been. This Easter egg does not work anymore. When it did work, it looked like the image given below.

Google Calculator Easter Eggs: The loneliest number
Do you know which is the loneliest number? Ask Google Calculator. Search Google for the loneliest number and the in-search Google Calculator will give one as the answer, which apparently is a tribute to the Harry Nilsson's song "One."

Once in a Blue Moon
Ever wondered how much is 'once in a blue moon'? You must have heard this phrase often but Google calculator will give you the exact value of this phrase and surprisingly, it denotes frequency rather than time. Go search Google for this to get "1.16699016 × 10-8 hertz" as the answer.

The number of horns on a unicorn
Want to know the number of horns on a unicorn? Google calculator can help. Searching Google for the number of horns on a unicorn will give 1 as the answer.

Answer to the Ultimate Question of Life, the universe and everything
Google is omniscient. Even the "answer to the ultimate question of life, the universe and everything" is known to Google. Just search Google for the above phrase and Google calculator will give you an answer. What are you waiting for? Just go to Google and find the true meaning of life.

[Pause to give you the time to search]

Surprised by the answer (42)? This is a reference to The Hitchhiker's Guide to the Galaxy, a popular novel based on a radio show (by the same name) of the late seventies. Google engineers surprised you with these tricks, didn't they?
Notepad, the text editor that comes bundled in Windows is an excellent tool for text editing. But that is not the only thing for which notepad is famous. It is also famous for its tricks and hacks. Here is a roundup of some of the best and coolest tricks that you can try using Notepad.


Matrix Falling Code Effect - Notepad CMD (.BAT) Tricks

Inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites. Copy and paste the code given below in Notepad and save the file as "Matrix.bat" or *.bat.



@echo off
color 02
:tricks
echo %random%%random%%random%%random%%random%%random%%random%%random%
goto tricks

Matrix Falling Code Effect - Notepad Trick

 Upon running the bat file, you will see the "Matrix falling code" effect.


Make Your Keyboard Type (Any) Message Continuously-VBS Trick

This VBS trick can make any of your friend's keyboard type any message continuously. Open Notepad, copy the code given below and save the file as Tricks.vbs or *.vbs. You will need to restart your computer to stop this. Try this after closing all important programs.

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "This is a Virus. You have been infected."
loop
Send this file to your friends as an email attachment to see the fun.


Create a Harmless Funny Virus with Notepad-Continuously eject CD/DVD drives

This VBS trick will create a code which will continuously eject all your connected Optical drives. If you put them back in, it will pop them out again. Copy this code and paste it in Notepad as Virus.vbs or *.vbs.

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Double click to open this file and you will be impressed by this awesome trick.

Make a Personal Diary(Log) with Notepad (Easter Eggs)

You can use this trick to create a personal log with Notepad which will automatically include the current date and time before your note. To do so, open Notepad and type .LOG in capital letters and press Enter. Save the file. Now, every time you open this file, notepad will automatically insert the current time and date before the note. Just enter your note and save the file each time after making an entry.

All these Notepad tricks are totally harmless and would not harm your PC in any way.  To close any of the VBS trick given, open task manager and close the wscript.exe process. These tricks work on Windows 8, Windows 7, Windows Vista and Windows XP.

We all use Microsoft Word to create documents. and some times we dont want other people to access our documents

specially when you are on a shared computer in your company and you may have your certain secret data stored in your word document that should not be accessed by your boss or other employee’s. To deal with such a situation Microsoft word 2007 integrated a security feature in Microsoft word so that you can password protect your files.

just follow these simple steps to make your document protected

Click on the Microsoft Office Button present on the top left corner of the window.

Now Click on the Save As option
Now a new window will pop up.

Click on Tools option at the bottom of the window.

Now you will have two options.

You can select either one or both options
One is Password To Open it will ask for the password every time the document is opened.

So to view the document you have to enter the password first.
Second is Password To Modify it will ask for the password every time somebody tries to modify the document.

Keep Visiting

Requirement:
1. Windows installation disk
2. Pendrive or usb flashdrive(for windows xp 1gb pen drive is enough but for other versions like vista,seven or 8 minimum 4gb drive is necessary)
3. Winsetupfromusb(it’s a freeware software you can easily find it by google search)

Procedure:
1. Insert the windows installation disk
2. Install the software(winsetupfromusb)
3. Connect the pendrive and format it in ntfs format

4. Run the software
5. Now select :
   a. Windows 2000/xp/2003 source = windows xp installation disk (only if you are creating windows xp bootable pen drive otherwise leave it blank)
   b. USB disk selection = your pen drive
   c. Force target disk type = removable
  d. You may also add = Check vista/7 setup/PE/RecoveryISO and select the windows installation disk(only if you are not creating xp bootable drive otherwise leave it unchecked)
   e. Press the go button
   f. Its done now all you need to do is wait because it’s a time consuming process so good luck with that.

Click here to download software



Many people know about this but majority of the people still don't have any idea about it. So for those people here is something special.

Requirement:
1. CSV extention file(its a format file. Download link is given below)
2. List of email ID's

Procedure:
I divide the entire procedure in 2 parts so anyone can understand it easily.



Part 1 :
1. Download the CSV file and open it in Ms-Excel
2. Put all e-mail ID's in coloumn B(E-mail Address) one by one(Only one ID in one cell).
3. Then save it(if asked for overwrite then select yes).



Part 2 :
1. Login to your facebook account.
2. Then open this link https://www.facebook.com/invite.php
3. Now click on "Import your email addresses" in "Invite Friends You Email" block.
4. Then click on other tools.
5. And upload that CSV file from your computer.

Download:

Click here to download CSV file



Sometimes it happens that we don't want people to use USB media or storage devices in our computer or laptop only because of the virus but in some special cases we can't refuse to use some devices.In that case, we can disable the USB ports by doing some settings in windows in such a way people can't detect it
procedure:

1. Go to run by pressing windows+R keys or you access it from start menu.

2. Type regedit as it is.
3. Now in registry editor console click on HKEY_LOCAL_MACHINE.
4. Then go to system.
5. click on CurrentControlSet.
6. Next click on services.
7. Now go to USBSTOR.
8. Double click on 'Start' where value is 3.
9. Now change the value data with 4.
10. Press ok and refresh your desktop your USB port is disabled.

Note: To enable the USB port again, just replace the value 4 with 3.