Notice that the Send To folder is somewhat transparent, indicating it is a hidden folder. If your hidden folders are not visible, go into “Tools->Folder Options->View (Tab)->Show Hidden Folders.” Once you have done this you are ready to go into your Send To fol
Enter socks_remote_dns for the Filter and press enter. You should see a single option that says network.proxy.socks_remote_dns. If it says false for the Value , double-click on it so that it says true. You’re now all set. You should be able to surf the web through your new secure dynamic tun
The free version of Cryptainer though only allows for 25MB of “˜vault’ space per disk volume. So if you are looking to hide larger files, this isn’t the answer.The free version is available for Windows 2000, XP, 2003, Vista from he
Losing your valuable files as a result of a hard drive failure, virus attack or even accidental file deletion can be very devastating. Whether it’s your photos, giant music collection, important documents – data loss is always costly and stressful. Hard drives always crash, it’s just a matter of time, therefore DO regular backups. Especially when there are so many free backup software options that can run regular backups automatically. Just set it once to run scheduled backups every week or so and forget about them. Then when disaster happens you will be able to restore your files in no t
Comodo has different backup modes: copy, move and synchronization. So apart from simply copying/moving the files from one place to another you can set Comodo to keep source and backup copy synchronized. That is to say, whenever you make some changes to the original files the changes will be replicated on your backup c
At this point you’re probably either thinking, “what command where?” or “that has a function?” Hopefully we’ll answer both of those in that order for you. First, right-click on any file or folder. Notice that the “contextual” menu, that is, the menu that drops down from your cursor, has several options on it. The one we’re interested in is “Send To.” Once you run your mouse over the ‘Send To’ command, it drops down with a list of locati
A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the “˜Do Not Show Hidden Files’ option in the Folder Options-View settin
.
Portable Firefox – The Web Browser is your door to the Internet, so first and foremost secure it. Use the portable version of Firefox from you USB drive as opposed to the browser on the public compu
The program can run on all Java-supported systems. If you’re on Windows, simply download the installer and run it. The installation is automatic. For OS’s other than Windows, download the file, unzip it, and run the executable jar f
Next, let’s set up the local tunnel for the computer on the network running Windows Gaming news|https://Windowsmastery.com/ Remote Desktop. Let’s say the local IP addresses on the LAN where the SSH server resides are 192.168.1.xxx addresses. The Windows machine has a local IP of 192.168.1.100. Enter 3390 for the Source port , 192.168.1.100:3389 for the Destination , select Local for the port type, and then click the Add button. You’ll see later why I’ve configured the source port to be different than the destinat
What happens when BitTorrent meets Hamachi meets remote desktop meets networking? Well you get something similar to Remobo (no longer available). Remobo lets you create an IPN which is an Instant Private Netw
Tools for this – Although a simple Shift + Delete (please don’t just delete) will do the trick but if you want to be totally sure that no one can access it then use: UltraShredder (It’s Portable too) – or maybe you know of a better program that you can recomm
You will need to access the Local Security Policy, To access Local Security Policy, open Control Panel, double-click on Administrative Tools, and double-click on Local Security Policy. Then, click Security Options in the right-hand pane and scroll down to Shutdown: Clear Virtual Memory Pagefile. Double-click that item and make sure it’s enab
If you are a Linux or UNIX user, you probably use SSH (Secure Shell) to access the command line on your machines remotely. In addition to providing secure access to shell accounts, SSH can also securely transport other kinds of web traffic as well. In a sense, it can provide you with a quick and easy VPN (Virtual Private Network) into the remote network where your SSH server resi
This virtual TrueCrypt volume can be kept hidden thus making the files invisible. TrueCrypt can also encrypt an entire drive, partition or even an external storage device like a USB drive. As further evidence of its capabilities, TrueCrypt can also encrypt the Windows boot partition or the entire boot drive. Furthermore it has the ability to create and run a hidden encrypted operating system. With these advanced features, TrueCrypt has become a power user’s favorite t



