First of all download ES FILE EXPLORER from google play store or some other external source.
First on the PC enable sharing in network at control panel.
Make sure your device and PC is connected to the same network/LAN
Sharing files between an Android device and Windows isn’t as difficult or as tedious as it once was. Apps, like ES File Explorer, can even share files over Wi-Fi with relative ease. We’ll show you how.
ES File Explorer - Windows folder
There was a time when the only way you could share files between your Android device and a Windows computer was by using a USB cable. These days, there are wireless options available that make it easier to share files. One such option is ES File Explorer, a powerful Android file manager. ES File Explorer helps you manage the files on your local Android device. Starting with version 3, however, LAN support was added to make it possible to share files with a Windows PC over Wi-Fi. To share files between your Android device and a Windows PC using ES File Explorer, follow the steps below:
Step 1: Create a shared folder on your Windows PC. In our example, we’ll name it, “Android PC share.” Make sure the permissions are set for read/write access.
Step 2: In ES File Explorer on your Android device, tap the globe icon in the upper-left hand corner, then navigate to Network > LAN.
ES File Explorer - enter LAN
Step 3: On the menu at the bottom, tap “Search” to look for available network shares on your LAN. If you don’t see any, make sure that your Android device and the Windows computer are connected to the same local network and try again. If successful, you should see your Windows computer listed with its IP address.
ES File Explorer - search LAN
Step 4: Tap on the icon for your Windows PC, then enter your Windows username and password.
ES File Explorer - Windows login
Step 5: After your shared folder appears, you can begin sharing files back and forth using ES File Explorer.
ES File Explorer - share files
ES File Explorer isn’t the only way to share files over Wi-Fi, but it’s a popular utility that you’re likely to have on your Android device anyway, so you’d might as well give it a try.
So many people are facing the same problem of the Shortcut Virus in their pen drive.  Sometimes when we insert pen drives and memory card in a USB port for the data transfer, then the files in your pen drive and memory cards turns into shortcut virus. This  is the most common problem for all. We see this virus in the systems which have anti-virus installed. When your PC, pen drive and memory cards got affected by any malware, then it will change all your original files into folders. So many people will face this problem. We can easily remove shortcut virus from Pendrive, just follow the bellow steps.

METHOD 1:-

Click on “Start” –>Run –> type cmd and click on OK.
Here I assume your pen drive letter as E:
Enter this command inside the double quotes as mentioned

attrib -h -r -s /s /d E:\*.*

Else try

del *.lnk (type this first and press enter)
then type
attrib -s -r -h *.* /s /d /l (type and press enter do not worry if command appears access denied, just check your pendrive it will finished)


You can copy the above command –> Right-click in the Command Prompt and paste it.
Note : Don’t forget to replace the letter ‘g’ with your pen drive letter.
Now press “Enter”.
That’s it!!!!
Now check for your files and folder in Pen Drive.

METHOD 2:-

USEBFIX is best and easy to use shortcut virus removal tool. To remove shortcut virus using USBFIX just follow these lucid steps.
1. Download USBFIX and install it.
Note: If your computer is not allowing to install this software then disable your antivirus for few minutes.
2. Connect your external storage devices (Pendrive, memory cards) to your PC.
remove shortcut virus with usbfix
3. Now click on deletion option. It will remove all shortcut virus from your plugged devices and it’ll restart your computer.
Every Android user is an explorer. They love to explore every nook and cranny of their beloved devices. This is why we share a fascination with the Android secret codes and hidden secret menus. We are going to list a ton of dialer codes that will do just about everything you can think of regarding Android diagnostics. Manufacturers don’t want certain options available to the normal users, and frankly, that’s a good idea. But if you want more control and power over your Android, read on and try some of these great Android secret codes. Smartphone manufacturers tend to keep the technical stuff away from the common users. They don’t want to confuse or overburden normal people with a bucket load of options. Thankfully, both Android OS developers and smartphone manufacturers tend to keep hidden menus accessible via dialer codes. There are some codes that are universal and are supported by almost any Android smartphone.

Some of the dialer codes are exclusive to manufacturers and may not work on all models for all carriers.

I’ll be listing them all in separate sections, so if you want to get codes that work on Samsung devices, you can just get over to that section and start having fun. I’ll be listing them all in separate sections, so if you want to get codes that work on Samsung devices, you can just get over to that section and start having fun
A point to be noted here is that some of the codes are a bit extreme. Some of them wipe your entire smartphone and factory reset it, so be cautious while inputting them. Read the description and then go on a code entering spree. That being said, let’s start with some great Android secret codes, hidden menu and dialer codes.

Android Common Codes

Description Code
Testing Menu *#*#4636#*#*
Display Info about device *#*#4636#*#*
Factory Restore *#*#7780#*#*
Camera Information *#*#34971539#*#*
Completely Wipe device, install stock firmware *2767*3855#
Backup all media files *#*#273283*255*663282*#*#*
Wireless LAN Test *#*#232339#*#* OR *#*#526#*#*
Change Power button behavior *#*#7594#*#*
Quick GPS Test *#*#1472365#*#*
Test mode for service activity *#*#197328640#*#*
Wi-Fi Mac Address *#*#232338#*#*
Another GPS test *#*#1575#*#*
Packet Loopback Test *#*#0283#*#*
Audio Test *#*#0673#*#* OR *#*#0289#*#*
Vibration and Backlight test *#*#0842#*#*
Check touch screen version *#*#2663#*#*
LCD test *#*#0*#*#*
Touch Screen test *#*#2664#*#*
Proximity sensor test *#*#0588#*#*
RAM version *#*#3264#*#*
Bluetooth test *#*#232331#*#*
Field Test *#*#7262626#*#*
Check Bluetooth device address *#*#232337#*#
Google Talk service monitoring *#*#8255#*#*
PDA, Hardware, Phone and RF Call Date info *#*#4986*2650468#*#*
PDA and Phone firmware check *#*#1234#*#*
FTA hardware version *#*#2222#*#*
FTA software version *#*#1111#*#*
Displays IMEI number *#06#
Enables voice dialing logging mode *#*#8351#*#*
Disables voice dialing logging mode *#*#8350#*#*
Brings up Epst menu ##778 +call
Displays Build time and change list number *#*#44336#*#*
Remove Google account setting *#*#7780#*#*
Reinstall the firmware *2767*3855#
Used to enter into Service mode *#*#197328640#*#*
Battery Status *#0228#
Data create menu *#273283*255*3282*#
Data usage status *#3282*727336*#
OTA update menu *#8736364#
RF band selection *#2263#
Diagnostic configuration *#9090#
USB 12C mode control *#7284#
USB logging control *#872564#
Debug dump menu *#746#
System dump mode *#9900#
Shows Build time change list number *#*#44336#*#*
NAND flash serial number *#03#
Real time clock test *#0782#
Light sensor test *#0589#
Quick test menu *#7353#
Execute from Emergency dial screen to unlock PUK code **05***#

Samsung Secret Codes

Display IMEI number *#06#
Display current firmware *#1234#
Diagnostic and general settings mode #*#4636#*#*
Factory soft reset *#*#7780#*#*
To display product code *2767*4387264636#
GPS test settings *#*#1472365#*#*
Service mode main menu *#*#197328640#*#*
SW & HW Info *#12580*369#
Bluetooth Address *#232337#
ADC Reading *#0228#
RF Band Selection *#2263#
Ciphering Info *#32489#
Bluetooth Test Mode *#232331#
Diagnostic Configuration *#9090#
WLAN Test Mode *#232339#
Vibration motor test *#0842#
WLAN MAC Address *#232338#
USB I2C Mode Control *#7284#
Audio Test Mode *#0673#
General Test Mode *#0*#
USB Logging Control *#872564#
GCF Configuration *#4238378#
Real Time Clock Test *#0782#
Audio Loopback Control *#0283#
LBS Test Mode *#3214789650#
GPS Control Menu *#1575#
RIL Dump Menu *#745#
Data Create Menu *#273283*255*3282*#
Proximity Sensor Test Mode *#0588#
Camera Firmware Update *#34971539#
Light Sensor Test Mode *#0589#
WLAN Engineering Mode *#526#
Debug Dump Menu *#746#
NAND Flash S/N *#03#
Software Version Info *#44336#
System Dump Mode *#9900#
Data Create SD Card *#273283*255*663282*#
Data Usage Status *#3282*727336*#
TSP / TSK firmware update *#2663#
Remap Shutdown to End Call TSK *#7594#
Camera Firmware Menu *#7412365# and *#*#34971539#*#*
WLAN Engineering Mode *#528#
Melody Test Mode *#0289#
OTA Update Menu *#8736364#
Test History *#07#
HSDPA/HSUPA Control Menu *#301279#
Quick Test Menu *#7353#
View Phone Lock Status *#7465625#
Auto Answer Selection *#272886#

HTC Secret Codes

Description Codes
Device information program #*#4636#*#*
Field Test *#*#7262626#*#*
HTC Function Test Program *#*#3424#*#*
Display Software version *#*#1111#*#*
Display hardware version *#*#2222#*#*
Wi-Fi Mac Address *#*#232338#*#*
Bluetooth Mac Address *#*#232337#*#
GPS Test *#*#1472365#*#*
GPS Test 2 *#*#1575#*#*
Bluetooth test *#*#232331#*#*
Display test *#*#0*#*#*
Touch Screen version *#*#2663#*#*
Touch Screen Test *#*#2664#*#*
Debug UI #*#759#*#*
Factory format *2767*3855#
Next PostNewer Posts Home