First, specify the address of your SSH server in the Session section. Select SSH for the Connection type and enter 22 for the Port (or whatever external internet port you are using to connect to your SSH serv

First of all, you will of course need an SSH server running somewhere. Linux and OS X come with SSH servers, but there are also SSH servers available for Windows. freeSSHd is a nice free SSH server for Windows. It is a quick and easy installation and relatively easy to configure as well. You will of course need administrator privileges on the machine you install it o

7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol

SyncBack — We have already covered the SyncBack backup tool earlier, but basically, it’s another backup software. Although the app has both free and paid versions, the free one has enough features for running local back

If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved

SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows 2000, XP, 2003, Vista from he

A couple of weeks ago I wrote an article in which I described some of the features I particularly liked about Vista. However in the comments Justin and anob pointed out that a couple of the features I had mentioned were not actually Vista speci

4. To find the folder and it’s contents again simply go back to the command prompt, type «CD C:Test» (of course, again replacing «Test» with the name of the folder,) and then type «attrib filename -s -h». You should now be able to find your file ag

Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em

. When the command prompt opens type «CD C:Test» (replace «Test» with the name of the folder you want to hide.)

2. Now type «attrib file +s +h» and replace «file» with the name of the actual file name you would like to h

Superstorm does it differently. The software enables a user to hide his secret files in any media such as pictures, audio, video, executable programs and many other file types. The secret file gets merged into the media file, but the media file continues to function like bef

A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the «˜Do Not Show Hidden Files’ option in the Folder Options-View settin

The program can run on all Java-supported systems. If you’re on Windows, simply download the installer and run it. The installation is automatic. For OS’s other than Windows multiplayer setup|https://windowsmastery.Com/, download the file, unzip it, and run the executable jar f

3. Now, go back to C:Test and look for your file or folder, it’s not there! You cannot find it through simply browsing around, through the command prompt, or even if you click «Show Hidden Files and Folde

You can set up tunnel for any service on any IP anywhere. You’ll just need to set up the program to connect to localhost on the source port you set up for the tunnel. It’s a pretty nifty way to connect to stuff you may not be able to otherwise, due firewall issues you may encounter. All you need is a single port to get to your SSH server, and it of course has to be running on that p

Most of us fire up Microsoft Word for our run of the mill document needs. Most of us don’t peek under the hood to see and use the other ready at hand tools that are just a few clicks away. I too accuse myself of this common shortcoming. It is perhaps a dire need or a serendipitous event that lead me to exploit a feature until now igno

The best choice is to use Firefox, because Firefox allows you to configure the browser to also send DNS requests through the proxy. If you use Internet Explorer, your DNS requests are still made via the local network you connect from and thus can still be monitored. So Firefox would be the preferred browser if you wish to maintain privacy on the network you are connecting f

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *