Clicking on «View Shared Files» will open up a webpage that allows you to view all the shared files (yours and others’) and also allows you to browse the files categorized by usernames so that you know who is sharing which fi

You can also sort several different mails that you receive on a daily basis into one folder. For example set up a rule that catches all mail from MakeUseOf (Sender contains MakeUseOf.com), then set up a different rule within the same Filter for each of the other newsletters or eMail updates you would like to sort into the same fol

Windows Vista has a large amount of options when it comes to customization, as do nearly all Windows game installation|https://windowsmastery.Com/ operating systems. Fortunately, Vista makes it even easier then you may believe to tweak your operating sys

The majority of the time you end up relying on on another product to get the annoyingware off of your machine. So now you’ve got a $60 bloated product eating up resources on your machine and doing absolutely nothing to protect

There are several different tests to run through. All attempting to try and take advantage of all the various activity that normal malware would. These tools are fantastic. Especially for a brand new system you may be setting up in a business or enterprise environm

Simply download and install. It will try to install a BitTorrent client (which will be required later as you will see) so if you already have your own, you can say no to this. While setting up the virtual network driver Windows will warn you. Click ‘continue’ and you should be good to

One of the most ridiculous features of Vista are the continuous «confirmation» messages. Messages that pop up nearly every time you attempt to run any unknown application. Almost all of which are completely unnecessary, and waste time. Here is how you can disable these annoying uac notifications, quickly and eas

Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em

Vista is riddled with an extremely large amount of «security» measures that may, or may not, be helpful. Running Vista as an Administrator may help, but did you know there is an even higher Administrator? Well, there is! All you need to do to unlock it is the follow

SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows 2000, XP, 2003, Vista from he

A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the «˜Do Not Show Hidden Files’ option in the Folder Options-View settin

Voila! This is a really useful little tool for me because I often need to play with several different types of files and find the best place to do that is on the Desktop. When I’m done using those files I either delete them or toss them into their relevant folders for safe keeping. ‘Send To’ now allows me to send all my screenshots in a batch into the Screenshots folder. This is also handy if you have any folders that take specific actions when items are added to t

Malware is a whole different ballgame, and is much more common and prevalent in today’s «internet» world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it’s always evolving, and many protective products can’t always prevent malicious activity. However, that doesn’t mean you shouldn’t attempt to block

Cryptainer does exactly as it advertises. The 3MB freeware creates encrypted vaults (plainspeak for an encrypted disk volume) which can be used to store any files in any media including USB drives. Multiple disks volumes can thus be created. The user can hide any file within the strong 128 bit encrypted password protected vault. Secure emails can also be sent using the encryption algorithm. Drag and drop any file into the «˜vault’ and it gets encrypted. The Cryptainer «˜vault’ is invisible so it effectively cloaks any file within

Nearly every single file on your computer contains some type of personal information — either information about the user, information on setting e.g. time, date, etc. In any case, it may be good to remove some of this information before making it available to the public, such as uploading a video or image onl

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *