(By) Varun Kashyap, who is getting absent minded and forget to mention his name in the last two articles. And before he forgets, he would like to invite you to his TechCrazy Blog, where he writes about latest on the web, tech tips, tweaks and ha
All in all a great application. There is the password issue that I mentioned and some dialogs that I feel are redundant, but overall it greatly simplifies the whole process or sharing files, using BitTorrent to send files, VPN setup and Remote Desk
Cryptainer does exactly as it advertises. The 3MB freeware creates encrypted vaults (plainspeak for an encrypted disk volume) which can be used to store any files in any media including USB drives. Multiple disks volumes can thus be created. The user can hide any file within the strong 128 bit encrypted password protected vault. Secure emails can also be sent using the encryption algorithm. Drag and drop any file into the "˜vault' and it gets encrypted. The Cryptainer "˜vault' is invisible so it effectively cloaks any file within
A lightweight software at 477KB, Sofonesia Folder Protector requires .Net Framework to function. Beyond that, hiding the folders is a cinch. Just add multiple files to the protected folder's list and click. The software also does not encrypt the contents, it only hides the folder. Folder Protector also works in the Safe Mode. Password protection also has a failsafe in a "˜Forget password' hint quest
Basically you can run any 3rd party application atop of Remobo. Want to play any game with your buddy just like you would have played it on the LAN? Easy, hover your mouse over the buddy name and get the IP. This is the virtual IP or the Remobo IP. Use this for streaming media configuration or playing games over the netw
Malware is a whole different ballgame, and is much more common and prevalent in today's "internet" world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it's always evolving, and many protective products can't always prevent malicious activity. However, that doesn't mean you shouldn't attempt to block
You will need to access the Local Security Policy, To access Local Security Policy, open Control Panel, double-click on Administrative Tools, and double-click on Local Security Policy. Then, click Security Options in the right-hand pane and scroll down to Shutdown: Clear Virtual Memory Pagefile. Double-click that item and make sure it's enab
No matter how much of a geek you are, lets face it some information must NEVER EVER be given when on public computers. This includes credit card numbers, paypal accounts or any other personal informat
For simplicity - yes. For encryption - no. The application allows you to assign a password to a single LockBox folder. If you want to handle multiple files or folders, you have to pull everything into a master folder and lock it. The locked folder disappears from view and cannot be accessed by anyone without the password. The folder according to the developer's website is also not accessible remotely, through DOS or the safe m
In order to be preventative, it would be nice to maybe give some of these products, which usually have a trial version, a run for their money before making the plunge and purchasing the full product. I've found a few tools to give each of these a test run, and see how well they actually are protecting
[NO LONGER WORKS] Spycar attempts to hijack your system, similar to typical malware activity and gives your protection a test. Spycar does not include any "exploits", so you do have to click OK during the process for the test to take affect. If your preventative software is successful during the process, a built-in TowTruck application responds with a rating on your prevention and then returns your system to it's original st
When Remobo starts, it asks you for the account details you just set up. Log in and then click on the button labelled "Menu" and then add one of your buddies on the Remobo network. You would have to enter the username of your buddy and your buddy will have to approve your request. This is unlike Hamachi where you create a network where others can j
Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your AV scanner to seek such h
I hope this guide can help you to do just that as I will be covering how you can use utilize windows Gaming guide|https://windowsmastery.com/ Search. Part one involves setting Search up to function optimally, Part two involves how best to use the many capabilities of Search itself in your organisat