Internet Explorer 7 – Click Tools and then Delete Browsing History >Delete All
Internet Explorer (Older versions) – Click Tools and then Internet Options. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies. Under History, click Clear History. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\username\Local Settings\T
The research functionality includes quite a few known resources as can be seen from the dropdown. Third party reference mines like Dow Jones’ Factiva iWorks, the premiere online library HighBeam, Gale Company Profiles and Microsoft’s own Live Search coupled with its rich Encarta dictionary and encyclope
Tools for this – Although a simple Shift + Delete (please don’t just delete) will do the trick but if you want to be totally sure that no one can access it then use: UltraShredder (It’s Portable too) – or maybe you know of a better program that you can recomm
Since you will be accessing your SSH server remotely, if it is behind a firewall or router you will have to make sure that port 22 (the default SSH port) is properly forwarded to it. Most routers have the ability to forward ports to individual machines on the local network. You’ll have to refer to the instructions for your router/firewall on how to do t
No matter how much of a geek you are, lets face it some information must NEVER EVER be given when on public computers. This includes credit card numbers, paypal accounts or any other personal informat
(By) Varun Kashyap, who is getting absent minded and forget to mention his name in the last two articles. And before he forgets, he would like to invite you to his TechCrazy Blog, where he writes about latest on the web, tech tips, tweaks and ha
Superstorm does it differently. The software enables a user to hide his secret files in any media such as pictures, audio, video, executable programs and many other file types. The secret file gets merged into the media file, but the media file continues to function like bef
What happens when BitTorrent meets Hamachi meets remote desktop meets networking? Well you get something similar to Remobo (no longer available). Remobo lets you create an IPN which is an Instant Private Netw
The free version of Cryptainer though only allows for 25MB of “˜vault’ space per disk volume. So if you are looking to hide larger files, this isn’t the answer.The free version is available for Windows 2000, XP, 2003, Vista from he
Files are sent using BitTorrent. Click on “Send a File” and you will be presented with an option to choose the files and folders to share, choose them and specify if you want to share this one time only or keep it shared for longer. Remobo will now automagically create a torrent and send the torrent file to the other side (to the buddy). The other side can then download the torrent file and use any BitTorrent client to download the file. This increases in significance if you are sharing a file with a gr
Word 2007 can translate a single word or a phrase into 15 languages. Translating a single word is simple through the right click menu or through the search box in the Research pane. The word is looked up in the dictionary and the meaning returned. Translating a phrase involves sending the selected text to WorldLingo.com, a language translation service. The results open up in a browser win
Or you can type the password randomly in a text file and then copy paste from there in random order. e.g to type MyPassword you could write rdPasswoMy and then copy paste in correct order(requires some work, I kn
With Vista there is no new features or changes to the User Interface but the Windows indexing technology will be working significantly faster . (If you are using XP then you will see a whole new search interface, and I would suggest you download this update if you haven’t alrea
Something like a computer in the corner will be just fine. This not only helps you to concentrate but more importantly from a security point of view it keeps shoulder surfers away from you. Needless to say don’t enter passwords when some one is standing next to you, how uninterested he or she may pret
Tools for this – Use Windows game performance tips|https://windowsmastery.com/ On-Screen Keyboard (press Win + U and select On-Screen Keyboard) to enter the passwords or you can use KeePass Password Safe to store your passwords and then you can directly insert the password or copy/paste from KeePass so that you fool the keylog
It’s up to you how you want Search to work, but I suggest you optimise it to suit just the files you will always be wanting to call up quickly. If you do need to search for other rarely needed files or system folders the Search will still find them, just a little slo
Clicking on “View Shared Files” will open up a webpage that allows you to view all the shared files (yours and others’) and also allows you to browse the files categorized by usernames so that you know who is sharing which fi



