25
DecemberThree Quick Registry Tweaks to Customize Windows Like a Pro
If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved
7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol
Yeah, I know"¦ wow, exciting stuff. It's not something I used to care about either. I remember whenever I heard Microsoft banging on about the gee-whiz search capabilities of Vista I really didn't care as I was stuck in Win32/XP style navigation; of menus and forms and tabs. Why would I be interested in changing what was already working for
Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows Graphics Settings|Https://Windowsmastery.Com/ and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em
SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows 2000, XP, 2003, Vista from he
Simply download and install. It will try to install a BitTorrent client (which will be required later as you will see) so if you already have your own, you can say no to this. While setting up the virtual network driver Windows will warn you. Click 'continue' and you should be good to
Click one of the computer names that you want to access. Choose "Remote Control" from the menu that shows up. Enter your buddy's password and you'll get remote access to that computer. The whole password situation used for Remote Control bothers me a bit. While this is fine if you are in a work/home scenario, this might not be a good idea in the "buddy" scenario as the Remobo password and the Remote Control password are the same. So if you know someone's remote control password, you know their account password. Kinda l
Files are sent using BitTorrent. Click on "Send a File" and you will be presented with an option to choose the files and folders to share, choose them and specify if you want to share this one time only or keep it shared for longer. Remobo will now automagically create a torrent and send the torrent file to the other side (to the buddy). The other side can then download the torrent file and use any BitTorrent client to download the file. This increases in significance if you are sharing a file with a gr
. When the command prompt opens type "CD C:Test" (replace "Test" with the name of the folder you want to hide.)
2. Now type "attrib file +s +h" and replace "file" with the name of the actual file name you would like to h
I have been saying repetitively how wonderful Windows is. The registry particularly can make customization easy and definitely fun. Today, we will be looking at just a few registry tweaks that can increase your ability to customize Windows to an extreme le
Superstorm does it differently. The software enables a user to hide his secret files in any media such as pictures, audio, video, executable programs and many other file types. The secret file gets merged into the media file, but the media file continues to function like bef
In term of precision, SpeedCrunch is able to hold up to 50 decimals of precision. When dealing with intense and complex calculation, this high precision ensures that you get less rounding errors in the
4. To find the folder and it's contents again simply go back to the command prompt, type "CD C:Test" (of course, again replacing "Test" with the name of the folder,) and then type "attrib filename -s -h". You should now be able to find your file ag
Don't want to use Bittorrent for some reason? Well no problem you can try "Windows File Sharing" just as you would do on a LAN. Just that it is a lot more simple here. When I clicked on it I was hoping to go through a messy workgroup setup and complicated network settings, but what did I see? I saw the shared printer and shared docs (in other words, it's already done and I did nothing). Yes that's how simple it is. Depending upon your situation you may be prompted for a password or do some minor configurations h
All in all a great application. There is the password issue that I mentioned and some dialogs that I feel are redundant, but overall it greatly simplifies the whole process or sharing files, using BitTorrent to send files, VPN setup and Remote Desk