Skip to main content

Blog entry by Ned Kopf

How to Hide Folders Using 7 Free Apps

How to Hide Folders Using 7 Free Apps

3. Now, go back to C:Test and look for your file or folder, it's not there! You cannot find it through simply browsing around, through the command prompt, or even if you click "Show Hidden Files and Folde

Basically you can run any 3rd party application atop of Remobo. Want to play any game with your buddy just like you would have played it on the LAN? Easy, hover your mouse over the buddy name and get the IP. This is the virtual IP or the Remobo IP. Use this for streaming media configuration or playing games over the netw

Click one of the computer names that you want to access. Choose "Remote Control" from the menu that shows up. Enter your buddy's password and you'll get remote access to that computer. The whole password situation used for Remote Control bothers me a bit. While this is fine if you are in a work/home scenario, this might not be a good idea in the "buddy" scenario as the Remobo password and the Remote Control password are the same. So if you know someone's remote control password, you know their account password. Kinda l

Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your AV scanner to seek such h

Then comes JetPhoto Studio , an all-in-one photo tool (available for Mac and Windows). This application is a bit unknown because developed by Chinese programmer. But unknown doesn't mean bad because this app has tons of good featu

Cryptainer does exactly as it advertises. The 3MB freeware creates encrypted vaults (plainspeak for an encrypted disk volume) which can be used to store any files in any media including USB drives. Multiple disks volumes can thus be created. The user can hide any file within the strong 128 bit encrypted password protected vault. Secure emails can also be sent using the encryption algorithm. Drag and drop any file into the "˜vault' and it gets encrypted. The Cryptainer "˜vault' is invisible so it effectively cloaks any file within

I personally find JetPhoto Studio to be very helpful, and my Flickr free account is already showing the limitation nags. What's your personal favorite for all-in-one photo management tool? Spill everything in the comments be

4. To find the folder and it's contents again simply go back to the command prompt, type "CD C:Test" (of course, again replacing "Test" with the name of the folder,) and then type "attrib filename -s -h". You should now be able to find your file ag

. When the command prompt opens type "CD C:Test" (replace "Test" with the name of the folder you want to hide.)

2. Now type "attrib file +s +h" and replace "file" with the name of the actual file name you would like to h

7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol

In order to be preventative, it would be nice to maybe give some of these products, which usually have a trial version, a run for their money before making the plunge and purchasing the full product. I've found a few tools to give each of these a test run, and see how well they actually are protecting

Malware is a whole different ballgame, and is much more common and prevalent in today's "internet" world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it's always evolving, and many protective products can't always prevent malicious activity. However, that doesn't mean you shouldn't attempt to block

To publish album to your web server, you can use WebSync. All uploaded pictures will be resized and stamped with watermark automatically while publishing. Once the album is published on web server, user can continually modify its content easily in JetPhoto Studio. The web-side online album will be updated and synchronized with the local album automatically, as long as WebSync is acted ag

Too many times we rely on our Anti-Virus/Anti-Spware to just work. We think since we have it installed, that it's safe and sound. I think we've come to find these days, many Anti-Virus applications do a very poor job of protecting you against ad/mal/spyware, even though they claim to do

Even though I'm not much of a photo person, I do manage my photos. Mostly just collecting-grouping-tagging-retouching (using iPhoto), and resizing (using now not free anymore ImageWell) to be able to easily send to my friend or use the image for my b

This virtual TrueCrypt volume can be kept hidden thus making the files invisible. TrueCrypt can also encrypt an entire drive, partition or even an external storage device like a USB drive. As further evidence of its capabilities, TrueCrypt can also encrypt the Windows game compatibility|https://windowsmastery.com/ boot partition or the entire boot drive. Furthermore it has the ability to create and run a hidden encrypted operating system. With these advanced features, TrueCrypt has become a power user's favorite t

  • Share