About LavishT@TWC

Lavish loves to follow up on the latest happenings in technology. He loves to try out new Windows-based software and gadgets and is currently learning JAVA. He loves to develop new software for Windows. Creating a System Restore Point first before installing a new software is always recommended, he feels.
Bat To Exe Converter

How to convert BAT to EXE file on Windows

Most of us are familiar with the Command Prompt and its basic commands. We usually execute a set of commands in order to complete a task or obtain some information. But this can also be done with the help of […]

3 free Time synchronization software for Windows 10/8/7

If your Windows is not synchronizing system time correctly, use these freeware to force Windows to sync time at every startup. By default Windows 10/8/7 syncs your system time with Internet servers on a weekly basis. And it does the […]

How to disable Chrome’s built-in PDF viewer

Chrome’s PDF Extension is undoubtedly a great way to view the PDF files on the go. It makes the task easier and also brings more accessibility to the browser. If you are using this feature already, you might have noticed […]

Extract & view contents of an MSI Installer file with lessmsi

Ever wondered how an installer actually works and miraculously installs an application from a single file? Windows Installers are nothing but files similar to a zip file that have other files compressed into them. Apart from those files, they have […]

What is Host Process for Windows Tasks in Windows 10

Whenever we face some performance issues with our computer, the first thing we do is open up the Task Manager, and then look for the applications or components which are using the most resources. If you are familiar with Task […]

WindowTop lets you pin a window on top, make it dark or transparent

Windows are essentially everything that controls and contain our applications. And managing them sometimes becomes a tedious task. While doing some important work, you might open around 7-8 windows and constantly switch between them can become confusing. We cannot eliminate […]

How to track IP address location

IP Address tracking has always been depicted as an ultimate tool to track location in movies. There is always a geek who is punching in the numbers and getting an exact location of the device. In reality, IP tracking might […]

How to add Group Policy Editor to Windows Home Editions

Group Policy is a Windows feature that lets network administrators modify and change some of the advanced Windows settings. And not just network computers, local Group Policy can be used to change advanced settings on a standalone PC as well. […]

SafePad is an end-to-end encrypted online Notepad

We need security everywhere, terms like ‘encryption’ and ‘authorization’ have become common these days. But how about security on your notepad? Yes, we note down a lot of simple things on our text editor or notepad. Enter ‘SafePad’ a free […]

How to take screenshots of a website remotely

Ever wanted to quickly take screenshots remotely? Or just wanted to take a screenshot of your website from some other computer for testing purpose. While we have reviewed numerous tools that let you capture a website screenshot. But these tools […]

List of Microsoft Apps available for Android

When you think about Microsoft, the first thing that comes to your mind is maybe Windows and Office. But the company has been working hard to gain popularity on other platforms like Android and iOS as well. In this post, […]

Download Ubuntu on Windows 10 from Windows Store

Download Ubuntu on Windows 10 from Windows Store

Microsoft recently announced Linux Subsystems for Windows 10. While the feature was made available to developers, Microsoft has released it on the Windows Store. You can now easily download Ubuntu subsystem for Windows 10 directly from the Windows Store. For […]

Eternal Blues ransomware scanner for WannaCry & NotPetya

You might have heard about the recent ransomware WannaCrypt and NotPetya spread across the internet. These crypto-ransomware make way to your network through the internet and vulnerable computers on your network. Protection against ransomware is not a requirement but a […]