January 2017

10 Useful RUN Commands on Windows

Top 10 Useful RUN Commands Windows
Useful RUN Commands Windows

Back again with our tips and trick, now we will learn about simple tips and trick 10 Useful RUN Commands on Windows. We believe most of users who read this article already know or maybe use the run feature on Windows (usually used to run a command prompt by typing cmd).

If you just learn about computer and still confuse about run command, according to Wikipedia :

On the Microsoft Windows Operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface.

Requirements:
 Windows O.S

10 Useful RUN Commands on Windows:


To run command, you can press the Windows keyboard logo and press R (Win logo + R)


1.  chkdsk


CHKDSK (short for "check disk") is a system tool in DOS, OS/2 and Windows. It verifies the file system integrity on hard disks or floppy disk and fixes logical file systemerrors. It is similar to the fsck command in Unix.

2.  compmgmt.msc

compmgmt.msc - Useful RUN Commands Windows
compmgmt.msc - Useful RUN Commands Windows


Microsoft Management Console (MMC) is a component of Windows 2000 and its successors that provides systemadministrators and advanced users an interface for configuring and monitoring the system.

Useful to monitor the computerstatus. View the shared folder, connected user, scheduler, etc

3.  devmgmt.msc

devmgmt.msc - Useful RUN Commands Windows
devmgmt.msc - Useful RUN Commands Windows

The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with. The list of hardware can be sorted by various criteria.

4.  dxdiag

dxdiag - Useful RUN Commands Windows
dxdiag - Useful RUN Commands Windows

DxDiag ("DirectX Diagnostics") is a diagnostics tool used to test DirectX functionality and troubleshoot video- or sound-related hardware problems. DirectX Diagnostic can save text files with the scan results. These files are often posted in tech forums or attached to support emails in order to give support personnel a better idea of the PC the requester is using in case the error is due to a hardware failure or incompatibility.

5.  cleanmgr

cleanmgr - Useful RUN Commands Windows
cleanmgr - Useful RUN Commands Windows

It was good if you keep your computer clean. By running this tool, you can clean some trash or cache file to make some free space on your system.

6.  dfrgui

dfrgui - Useful RUN Commands Windows
dfrgui - Useful RUN Commands Windows


Disk Defragmenter is a utility in Microsoft Windowsdesigned to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation. Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk.[1] Beginning with Windows XP, Disk Defragmenter also reduces system startup times.

7.  diskmgmt.msc or diskpart

diskpart - Useful RUN Commands Windows
diskpart - Useful RUN Commands Windows

The Logical Disk Manager (LDM) is an implementation of a logical volume manager for Microsoft Windows NT, developed by Microsoft and Veritas Software. It was introduced with the Windows 2000 operating system, and is supported in Windows XP, Windows Server 2003, Windows Vista, Windows 7 and Windows 8. The MMC-based Disk Management snap-in (diskmgmt.msc) hosts the Logical Disk Manager. On Windows 8 and Windows Server 2012, LDM was deprecated in favor of Storage Spaces.

8.  secpol.msc

secpol.msc - Useful RUN Commands Windows
secpol.msc - Useful RUN Commands Windows

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.
With the local security policy, you can control:
– Who accesses your computer.
– What resources users are authorized to use on your computer.
– Whether or not a user or group's actions are recorded in the event log.

9.  perfmon

perfmon - Useful RUN Commands Windows
perfmon - Useful RUN Commands Windows

Performance Monitor is a simple yet powerful visualization tool for viewing performance data, both in real time and from log files. With it, you can examine performance data in a graph, histogram, or report.

10.  gpedit.msc

gpedit.msc - Useful RUN Commands Windows
gpedit.msc - Useful RUN Commands Windows

Group Policy is a feature of the Microsoft Windows NT family of operating systems that control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.


Windows Start | Run commands

Start RUN Commands
Windows Start RUN Commands

DescriptionRun Command
Accessibility Optionsutilman
or
control access.cpl
Add Hardware Wizardhdwwiz
Add/Remove Programs
(Add New Programs)
(Add Remove Windows Components)
(Set Program Access & Defaults )
appwiz.cplcontrol appwiz.cpl,,1
control appwiz.cpl,,2
control appwiz.cpl,,3
Administrative Toolscontrol admintools
Advanced User Accounts Control Panelnetplwiz
Authorization Managerazman.msc
Automatic Updatecontrol wuaucpl.cpl
Backup and Restore Utilitysdclt
Bluetooth Transfer Wizardfsquirt
Calculatorcalc
Certificate Managercertmgr.msc
Character Mapcharmap
Check Disk Utilitychkdsk
Clear Type (tune or turn off)cttune
Color Managementcolorcpl.exe
Command Promptcmd
Component Servicesdcomcnfg
or
comexp.msc
Computer ManagementCompMgmtLauncher.exe
or
compmgmt.msc
Control Panelcontrol
Credential (passwords) Backup and Restore Wizardcredwiz
Data Execution PreventionSystemPropertiesDataExecutionPrevention
Date and Time Propertiestimedate.cpl
Device Managerhdwwiz
or
devmgmt.msc
Device Pairing WizardDevicePairingWizard
Digitizer Calibration Tool (Tablets/Touch screens)tabcal
Direct X Control Panel (if installed)directx.cpl
Direct X Troubleshooterdxdiag
Disk Cleanup Utilitycleanmgr
Disk Defragmenterdfrgui
defrag
Disk Managementdiskmgmt.msc
Disk Partition Managerdiskpart
Display Color Calibrationdccw
Display DPI / Text sizedpiscaling
Display Properties (Themes, Desktop, Screensaver)control desktop
Display Properties (Resolution, Orientation)desk.cpl
Display Properties (Color & Appearance)control color
Documents (open 'My Documents' folder)documents
Downloads (open 'Downloads' folder)downloads
Driver Verifier Utilityverifier
DVD Playerdvdplay
Edit Environment Variablesrundll32.exe sysdm.cpl,EditEnvironmentVariables
Encrypting File System Wizard (EFS)rekeywiz
Event Viewereventvwr.msc
File Signature Verification Tool (Device drivers)sigverif
Files and Settings Transfer Tool%systemroot%\system32\migwiz\migwiz.exe
Firewall Control Panelfirewall.cpl
Folders Propertiescontrol folders
Fonts listcontrol fonts
Font previewfontview arial.ttf
Game Controllersjoy.cpl
Local Group Policy Editorgpedit.msc
Internet Propertiesinetcpl.cpl
IP Configurationipconfig
iSCSI Initiator configurationiscsicpl
Keyboard Propertiescontrol keyboard
Language Pack Installerlpksetup
Local Security Policysecpol.msc
Local Users and Groupslusrmgr.msc
Log outlogoff
Microsoft Malicious Software Removal Toolmrt
Microsoft Management Consolemmc
Access (Microsoft Office)msaccess
Excel (Microsoft Office)Excel
Powerpoint (Microsoft Office)powerpnt
Word (Microsoft Office)winword
Microsoft Paintmspaint
Microsoft Support Diagnostic Toolmsdt
Mouse Propertiescontrol mouse
or
main.cpl
Network Connectionscontrol netconnections
or
ncpa.cpl
Projector:
Connect to Network Projector
Switch projector display
netproj

displayswitch
Notepadnotepad
ODBC Data Source Admin
Default ODBC driver:
32-bit ODBC driver under 64-bit platform:

C:\windows\system32\odbcad32.exe
C:\windows\sysWOW64\odbcad32.exe
ODBC configuration - Install/configure MDAC driversodbcconf
On Screen Keyboardosk
OOB Getting Startedgettingstarted
Pen and Touch (Tablet/Pen input configuration)tabletpc.cpl
Performance Monitorperfmon.msc
Phone and Modem Optionstelephon.cpl
Phone Dialerdialer
Power Configurationpowercfg.cpl and powercfg.exe
Presentation SettingsPresentationSettings
Problem Steps Recorderpsr
Program Access and Computer Defaults - browser / email / mediacomputerdefaults
Printers and Faxescontrol printers
Print Management (.msc)PrintManagement
Printer Migration (backup/restore)printbrmui and printbrm.exe
Printer user interface (List all printui.dll options)printui
Private Character Editoreudcedit
Regional Settings - Language, Date/Time format, keyboard locale.intl.cpl
Registry Editorregedit
Remote Assistancemsra
Remote Desktopmstsc
Resource Monitorresmon
Resultant Set of Policyrsop.msc
Scheduled Taskscontrol schedtasks
Screenshot Snipping Toolsnippingtool
Security Centerwscui.cpl
Servicesservices.msc
Shared Folder Wizardshrpubw
Shared Foldersfsmgmt.msc
Shut Down Windowsshutdown
Software Licensing/Activationslui
Sounds and Audiommsys.cpl
Sound Recordersoundrecorder
Sound Volumesndvol
Syncronization Tool (Offline files)mobsync
System Configuration Utilitymsconfig
System File Checker Utility (Scan/Purge)sfc
System Informationmsinfo32
System Properties
sysdm.cpl SystemProperties
or
sysdm.cpl DisplaySYSDMCPL
System Properties - PerformanceSystemPropertiesPerformance
System Properties - HardwareSystemPropertiesHardware
System Properties - AdvancedSystemPropertiesAdvanced
System Repair - Create a System Repair Discrecdisc
System Restorerstrui
Task Managertaskmgr
Task Schedulertaskschd.msc
Telnet Clienttelnet
Trusted Platform Module Initialization WizardtpmInit

User Accounts (Autologon)
control userpasswords2
User Account Control (UAC) SettingsUserAccountControlSettings
User Profiles - Edit/Change typeC:\Windows\System32\rundll32.exe sysdm.cpl,EditUserProfiles
Windows Disc Image Burning Toolisoburn C:\movies\madmax.iso
Windows Explorerexplorer
Windows Featuresoptionalfeatures
Windows Firewall
Windows Firewall with Advanced Security
firewall.cpl
wf.msc
Windows Image Acquisition (scanner)wiaacmgr
Windows Magnifiermagnify
Windows Management Infrastructurewmimgmt.msc
Windows Memory Diagnostic Schedulermdsched
Windows Mobility Center (Mobile PCs only)mblctr
Windows PowerShellpowershell
Windows PowerShell ISEpowershell_ise
Windows Security Action Centerwscui.cpl
Windows Script Host(VBScript)wscript NAME_OF_SCRIPT.VBS
Windows System Security Tool. Encrypt the SAM database.
(boot password.)
syskey
Windows Updatewuapp
Windows Update Standalone Installerwusa
Windows Version (About Windows)winver
WordPadwrite

Unless indicated otherwise, all the commands above work in all versions of Windows from Vista upwards.😊👍

Most of these utilities can be found in %systemroot%\System32

Top 5 RAR Password Crackers/Recovery Software for Window PC

Top 5 RAR Password Remover/Unlocker
Top 5 RAR Password Remover/Unlocker


In this post we learn how to crack/recover RAR file password in Window PC. If you forgot you RAR file password and don’t know how to get it back, read this guide, this is for you.

When you forgot RAR file password, you have two choices. One is ask someone for RAR open password. If unfortunately it doesn’t work, you can reset and remove RAR password with a powerful RAR password Crackers tool.

What is RAR ?


RAR is the format used by WinRAR archiver. The RAR format functions similarly to the ZIP format since they are both data containers. Both of them are also used to compress lots of files. However, as compared to the ZIP format, RAR has more advanced features like the following: more convenient multivolume archives, tight compression, multimedia text modes, AES-128 protection, helping to repair an archive even in case of physical data damage and Unicode support to process non-English file names.

Top 5 RAR Password Crackers/Recovery Software for Windows


1. RAR Password Unlocker

As its name suggests, RAR Password Unlocker, also named as WinRAR password cracker, helps recover lost passwords of RAR files. The program has three ways to retrieve the passwords namely brute-force, brute-force with user-defined mask and dictionary. Moreover, it supports all RAR files created by any program.
Upon opening the program, you have a basic interface with two main choices: RAR Password Recovery and Search Encrypted Files. RAR Password Recovery allows you to open a RAR file that you want to recover the password while Search Encrypted Files scans your entire system to find encrypted files.
Advantages:
The main advantage of the program is its easy-to use user interface.
You won’t have any problem navigating through it. Selecting a RAR file you want to unlock is straightforward.
Disadvantages:
However, while using the RAR Password Unlocker program, there are a couple of crashes. This is a minor problem that could be fixed in the future though.
Also, you need to buy the full version for USD 19.95 to recover more than three-character password.

RAR Password Unlocker
RAR Password Unlocker


2. KRyLack RAR Password Recovery

KRyLack RAR Password Recovery is a free RAR password cracker tool. It makes use of the brute-force technique in finding the password.
The main screen of the program lets you set all the parameters you want. You can choose a RAR file by clicking on the browse button. It also lets you pick the character sets you think the password contains which makes the recovery process faster. Character sets you can choose are Latin, spaces, digits and symbols. A user-defined character set is also available. Furthermore, you can select the method of recovery by choosing from brute-force, mask and dictionary.
Advantages:
The user interface of the program lays out all the settings in the center of the screen for easy access.
Moreover, the password recovery is pretty quick too. This is because the program allows you to choose certain character sets.

KRyLack RAR Password Recovery
KRyLack RAR Password Recovery

3. RAR Password Recovery Professional


RAR Password Recovery Professional is password unlocker software. The tool possesses three attack methods: brute-force, brute-force with mask and dictionary. It is optimized for multi-core CPUs and NVIDIA-GPU to recover passwords swiftly.
The interface consists of four tabs namely recovery, brute-force, dictionary and options. To start using the program, click on ‘Open’ to import the password-protected RAR archive. Next, choose from either brute-force or dictionary attack and set up the parameters. Finally, click on ‘Start’ to begin retrieval process.
Advantages:
It is worth mentioning that the application has a beautiful design. Everything is easy to use and pleasing to the eyes.
You can see the progress bar and some information during the recovery process which keeps you updated.
Disadvantages:
The problem with the free version is that it limits the password that can be recovered to three characters only. To get out of this restriction you have to pay USD 19.95.

RAR Password Recovery Professional
RAR Password Recovery Professional


4. RAR Password Recovery Magic


RAR Password Recovery Magic is a professional tool used for retrieving passwords of RAR archives.
The main interface lets you add encrypted RAR archives by clicking on open button. The settings button has the options for brute force and dictionary. The brute-force mode allows you to select among letters, numbers and symbols, depending on what you think is the password for quicker retrieval. For the dictionary mode, you can select a text file containing the words to be searched.
Advantages:
It has a easy-to-use interface. There are no learning curves when using it for the first time.
Moreover, the tool was able to find out the password of a RAR archive quickly. In just a few minutes, the process is done.
Disadvantages:
Though the free version can only be used ten times, the payment required for the full version is USD 29.99.

RAR Password Recovery Magic
RAR Password Recovery Magic


5. Daossoft RAR Password Recovery


Daossoft RAR Password Recovery is the answer when you cannot open a RAR file because you forgot the password. It is a program which has the capability of unlocking the password using three attack options. These options are brute-force, brute-force with user-defined mask and dictionary.
Clicking on the open tab allows you to browse and choose RAR files that are password-protected. The application offers a variety of settings like the ability to set ranges for brute force method in order to make the process run faster. For instance, you can select small letters, capital letters, numbers and symbols. Also, you can select the password length. On the other hand, for the dictionary attack, you can choose the file of the dictionary you want to use.
Advantages:
The advantage of using Daossoft RAR Password Recovery is its professional set of features packed in an elegant design.
The application is easy to use as well. There are no problems in finding what you need.
Disadvantages:
A downside of using the tool is it is at times slow to response. It takes some time before the password is cracked.

Daossoft RAR Password Recovery
Daossoft RAR Password Recovery


How to Create a Protected Folder Without any Software

How to Create a Password Protected Folder without any Software Cyber TechNick
Password protect a folder without any Software

Learn How to lock a Folder with Password without any software. You can lock folder with lot of ways. But this one is cool and without software.

Locking a Folder with Password – Overview


Password protect your Window 10 PC folder without downloading any third party software in your PC. Just follow this post and know how this works.

There are many software that will provide you this feature but there is a problem with that. if by any means that software is un-installed you might loose you personal data because of the login credentials will be deleted. In this tutorial you will learn to create your own method to lock a folder with a password protection.

How To Lock a Folder With Password – Steps


Step 1. Open Notepad. Copy the below code and paste it into the notepad.
Note: You can change the password with your desired one you just need to edit this line “if NOT %pass%== CYBERTECHNICK goto FAIL” . You can replace “CYBERTECHNICK” with your password.



cls
@ECHO OFF
title Folder Private
if EXIST “PRO HACKER LOCKER” goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private “CYBERTECHNICK LOCKER”
attrib +h +s “CYBERTECHNICK LOCKER”
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p “pass=>”
if NOT %pass%== CYBERTECHNICK goto FAIL
attrib -h -s “CYBERTECHNICK LOCKER”
ren “CYBERTECHNICK LOCKER” Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End

Submit

Step 2. Now save it as Locker.bat

How toPassword protect a folder without any Software Cyber TechNick
Password protect a folder without any Software

Step 3. Now run the Locker.bat at the saved location now a folder named “Private” will be automatically created in that directory.

How to Password protect a folder without any Software Cyber TechNick
Password protect a folder without any Software


Step 4. Now place your files which you want to protect in the “Private” folder. Now again double click the Locker.bat file and it will ask you “Are you sure you want to lock the folder(Y/N)”.

Step 5. Type Y and then press enter, Folder “Private” will then get hidden.

How to Password protect a folder without any Software Cyber TechNick
Password protect a folder without any Software

Step 6. Now again click on the Locker.bat file and it will ask you the unlock password and the password is CYBERTECHNICK.

That’s it! Your folder is now secured with the password every time you want to secure your files run the Locker.bat and place your files in the “Private” folder and again run Locker.bat file which will hide the folder "Private".

This is one of the best tricks for securing your data without downloading any third party software in your PC. All you just need is a piece of code to protect your data.
So isn’t it cool? You can easily lock a folder in few clicks. Complete folder protection without any software. Let us know if you faced any issues during folder locking. You can easily save your personal documents and files inside that folder and lock them

How To Remove Virus From USB Or Any Drive On Windows 10 Using CMD 

How to remove Virus from USB Cyber TechNick
How to remove Virus from any Drive or USB Using CMD

Know what damage a virus could do to you

Do you know how viruses can damage your computer exactly? There are many types of viruses, and they behave in many differentiated ways. To sum up, a computer virus is simply a type of program that causes your computer to act in an undesirable way. It can be dangerous, to drag your computer down, erase very important files, or gives hackers access to your personal information…

Viruses are nuisance, unfortunately, it seems unlikely to avoid it. Some viruses like Locky virus and CryptoLocker, also known as ransomware, delete computer files, encrypt them, even change the file extension to .locky or .encypt, while some virus hide files, making users find nowhere to unhide them. If you happen to be a victim who’s looking for .locky file recovery and .crypt file recovery, then click the links.

Properties and type of it’s:
A virus can be present in your system as a file format and its different.

Properties of this virus:

A virus can be a file hidden from a userA virus can be present in the form of an ‘autorun’ or ‘Autoexec’ fileIt can be an exec fileIt can be a file with different attribute permissions

Some of the well-known examples of the above kinds of the viruses are:

Ravmon.exe
New Folder.exe
svchost.exe
Heap41a

General knowledge about commands

In this page, we’re going to offer you solutions to remove viruses from your USB drive, memory card, in fact, any drive in a Windows 10 computer using CMD. In order to remove a virus using CMD, we will use a famous CMD command called ‘attrib’ command. So first, we’d better have some understanding about the commands we’re supposed to use.

Here are the basic attributes of the ‘attrib’ command which we will use later:

R – R represents the “Read-only” attribute of a file or folder. Read-only means the file cannot be written or executed.
H – H stands for the “Hidden” attribute.
A – Similarily,  A stands for “Archiving” which prepares a file for archiving.
S – S attribute changes the selected files or folders into a system file from a user file by assigning the “System” attribute to that particular file.

“attrib” Syntax:

ATTRIB [+ attribute | – attribute] [pathname] [/S [/D]]

In the above command, let’s see what the different parameters and switches are:

‘+ / –’:            To enact or to cancel the specified attribute.
‘attribute’:   As explained above.
‘/S’:                  Searching throughout the entire path including subfolders.
‘/D’:                 Include any process folder.
‘pathname’: Path where the target file or folder is located.

Here is the proper syntax for attrib command:

ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H] [+I | -I] [drive:][path][filename] [/S [/D] [/L]]

How to remove virus from USB drive, memory SD card and other drive using CMD in Windows 10

How to remove Virus from USB on Windows 10
Removing Virus from USB Using Windows 10

Just give you an example. I am going to transfer an ‘autorun.inf’ virus from my USB drive to my D: drive and delete that virus from my D: drive.


  • Step 1. Open Command Prompt from search and run as an administrator.
  • Step 2. Type D: and press Enter
  • Step 3. Type attrib and press Enter. You’ll see autorun.inf virus listed.
  • Step 4. To remove virus using CMD, type into your command prompt attrib -r -a -s -h *.* and press Enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. (*.* for all the files with all different types of file extensions).
  • Step 5. Type del autorun.inf and enter, to delete the files.


I hope this would have been informative for you. If you know some other tricks, let us know in the comments below.

Related Video

Crack WPA/WPA2 Wifi Password Without Dictionary/Brute Fore Attack using Fluxion

Crack Wifi WPA/WPA2 Password Using Fluxion

Fluxion, A Key To Pentesting/Hacking Your WPA/WPA2 Security Without Brute Force

Fluxion script has been available for a while and is most apt for security researchers and pentesters to test their network security by hacking WPA/WPA2 security without brute forcing it. Fluxion is based on another script called linset. Fluxion is not much different from Linset but makes use of certain improvements, bug fixes, and additional features. Fluxion works by using something like a man in the middle attack/ evil twin attack to get WPA password instead of going the bruteforce/dictionary route.

 Download Fluxion

Fluxion is compatible with the latest release of Kali (Rolling). Latest builds (stable) and (beta) here. Kindly read the Fluxion Wiki to get the full tutorial.

How it works:


Step 1: Scan the networks.

Step 2: Capture a handshake (can’t be used without a valid handshake, it’s necessary to verify the password)

Step 3: Use WEB Interface *

Step 4: Launch a FakeAP instance to imitate the original access point

Step 5: Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.

Step 6: A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script

Step 7: A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password

Step 8: Each submitted password is verified by the handshake captured earlier

Step 9: The attack will automatically terminate, as soon as a correct password is submitted

Requirements:


Linux operating system 
Kali Linux 2 or Kali 2016.1 rolling or Kali 2 & 2016 support the latest Aircrack-ng versions
External Wi-Fi card is recommended

Read Full Detailed Article here


 Hacking WPA/WPA2 without dictionary/bruteforce : Fluxion – www.kalitutorials.net

Related Videos:

It depends on the victim.This method don’t crack the password. This is a phishing method.When you capture wpa handshake, you block victim’s wifi and create a new wifi spot without protection with the same name. Then the victim must connect in this wifi. When the victim connected in your new wifi, will be displayed a login page. Then the victim will write his password.

MKRdezign

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget