I hope this guide can help you to do just that as I will be covering how you can use utilize Windows Search. Part one involves setting Search up to function optimally, her response Part two involves how best to use the many capabilities of Search itself in your organisat
I hope this helps you get the most accurate search results as quickly as possible. Some of it's pretty basic I know, but in part two I will be going through how to search using filters, saved searches and virtual folders which will make your organisation a whole lot eas
I have been saying repetitively how wonderful Windows is. The registry particularly can make customization easy and definitely fun. Today, we will be looking at just a few registry tweaks that can increase your ability to customize Windows to an extreme le
Cryptainer does exactly as it advertises. The 3MB freeware creates encrypted vaults (plainspeak for an encrypted disk volume) which can be used to store any files in any media including USB drives. Multiple disks volumes can thus be created. The user can hide any file within the strong 128 bit encrypted password protected vault. Secure emails can also be sent using the encryption algorithm. Drag and drop any file into the "˜vault' and it gets encrypted. The Cryptainer "˜vault' is invisible so it effectively cloaks any file within
A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the "˜Do Not Show Hidden Files' option in the Folder Options-View settin
Windows Registry Editor Version 5.00[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0]@="TITLE HERE"[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0DefaultIcon]@="ICON HERE"[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0InProcServer32]@=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,68,00,64,00,6f,00,63,00,76,00,77,00,2e,00,64,00,6c,00,6c,00,00,00"ThreadingModel"="Apartment"[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0Instance]"CLSID"="3f454f0e-42ae-4d7c-8ea3-328250d6e272"[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0InstanceInitPropertyBag]"CLSID"="13709620-C279-11CE-A49E-444553540000""method"="ShellExecute""Command"="TITLE HERE""Param1"="FUNCTION HERE"[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0shellex][HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0shellexContextMenuHandlers][HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0shellexContextMenuHandlers2559a1f6-21d7-11d4-bdaf-00c04f60b9f0]@=""[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0shellexMayChangeDefaultMenu]@=""[HKEY_CLASSES_ROOTCLSID2559a1f6-21d7-11d4-bdaf-00c04f60b9f0ShellFolder]"Attributes"=dword:0000
7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol
This virtual TrueCrypt volume can be kept hidden thus making the files invisible. TrueCrypt can also encrypt an entire drive, partition or even an external storage device like a USB drive. As further evidence of its capabilities, TrueCrypt can also encrypt the Windows boot partition or the entire boot drive. Furthermore it has the ability to create and run a hidden encrypted operating system. With these advanced features, TrueCrypt has become a power user's favorite t
3. Now, go back to C:Test and look for your file or folder, it's not there! You cannot find it through simply browsing around, through the command prompt, or even if you click "Show Hidden Files and Folde
No matter how much of a geek you are, lets face it some information must NEVER EVER be given when on public computers. This includes credit card numbers, paypal accounts or any other personal informat
Occasional snoopiness is the habit of man. The little world contained within our computers isn't safe from eavesdroppers. The need to feel secure probably explains the surplus of encryption software available. We all have some skeletons in our hard disks or just need to keep some valuable files away from prying eyes. We already have looked at a few ways to do it manually here on MakeUseOf. You can read about it here , here and he
A lightweight software at 477KB, Sofonesia Folder Protector requires .Net Framework to function. Beyond that, hiding the folders is a cinch. Just add multiple files to the protected folder's list and click. The software also does not encrypt the contents, it only hides the folder. Folder Protector also works in the Safe Mode. Password protection also has a failsafe in a "˜Forget password' hint quest
4. To find the folder and it's contents again simply go back to the command prompt, type "CD C:Test" (of course, again replacing "Test" with the name of the folder,) and then type "attrib filename -s -h". You should now be able to find your file ag