25
DecemberSpeedCrunch - High Precision Freeware Desktop Calculator
. When the command prompt opens type "CD C:Test" (replace "Test" with the name of the folder you want to hide.)
2. Now type "attrib file +s +h" and replace "file" with the name of the actual file name you would like to h
Nearly every single file on your computer contains some type of personal information - either information about the user, information on setting e.g. time, date, etc. In any case, it may be good to remove some of this information before making it available to the public, such as uploading a video or image onl
Superstorm does it differently. The software enables a user to hide his secret files in any media such as pictures, audio, video, executable programs and many other file types. The secret file gets merged into the media file, but the media file continues to function like bef
Windows Vista has a large amount of options when it comes to customization, as do nearly all Windows operating systems. Fortunately, Vista makes it even easier then you may believe to tweak your operating sys
Or you can type the password randomly in a text file and then copy paste from there in random order. e.g to type MyPassword you could write rdPasswoMy and then copy paste in correct order(requires some work, I kn
Next, let's set up the local tunnel for the computer on the network running Windows Remote Desktop. Let's say the local IP addresses on the LAN where the SSH server resides are 192.168.1.xxx addresses. The Windows gaming guide|https://windowsmastery.com/ machine has a local IP of 192.168.1.100. Enter 3390 for the Source port , 192.168.1.100:3389 for the Destination , select Local for the port type, and then click the Add button. You'll see later why I've configured the source port to be different than the destinat
Since you will be accessing your SSH server remotely, if it is behind a firewall or router you will have to make sure that port 22 (the default SSH port) is properly forwarded to it. Most routers have the ability to forward ports to individual machines on the local network. You'll have to refer to the instructions for your router/firewall on how to do t
You will need to access the Local Security Policy, To access Local Security Policy, open Control Panel, double-click on Administrative Tools, and double-click on Local Security Policy. Then, click Security Options in the right-hand pane and scroll down to Shutdown: Clear Virtual Memory Pagefile. Double-click that item and make sure it's enab
In term of precision, SpeedCrunch is able to hold up to 50 decimals of precision. When dealing with intense and complex calculation, this high precision ensures that you get less rounding errors in the
Occasional snoopiness is the habit of man. The little world contained within our computers isn't safe from eavesdroppers. The need to feel secure probably explains the surplus of encryption software available. We all have some skeletons in our hard disks or just need to keep some valuable files away from prying eyes. We already have looked at a few ways to do it manually here on MakeUseOf. You can read about it here , here and he
Remote - As the name somewhat implies, this is the reverse of a local tunnel. You are probably less likely to use this, but it would allow machines on the SSH server network to access a machine and port on the network where your SSH client resides. I won't go through any examples on setting up a remote port in this arti
In addition, SpeedCrunch records all your calculations and place them in its history. Whenever you need to re-enter the same expression, simply load up the history panel and select the one that you entered previously. If you are doing a lot of intense calculations, this is going to be very help
For advanced calculation, you will need to use variables to hold calculation results. SpeedCrunch allows you to define as many variables as you want. There are also pre-defined variables such as pi that you can use off- h
7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol
In access of the above features, SpeedCrunch allows you to save your session so that you can resume from where you stopped the last time. Your history and variables will be intact the next time you load up the sess
One of the most ridiculous features of Vista are the continuous "confirmation" messages. Messages that pop up nearly every time you attempt to run any unknown application. Almost all of which are completely unnecessary, and waste time. Here is how you can disable these annoying uac notifications, quickly and eas
You can set up tunnel for any service on any IP anywhere. You'll just need to set up the program to connect to localhost on the source port you set up for the tunnel. It's a pretty nifty way to connect to stuff you may not be able to otherwise, due firewall issues you may encounter. All you need is a single port to get to your SSH server, and it of course has to be running on that p