메뉴 건너뛰기

XEDITION

Board

Chances are you are receiving too many. Hopefully you're receiving little spam, but certainly you have a lot of mail hitting your inbox that doesn't need your immediate attention. Maybe you even receive private stuff at work that you should rather not attend to at all until you're h


Of course you cannot just sort mails into folders. You can have the message filters perform several other actions as seen in the menu pictured above. For example, automatically "Mark As Read", "Tag Message" or (the coolest) reply with a template. If required you can have the message filter carry out multiple actions on the same eM


Internet Explorer 7 - Click Tools and then Delete Browsing History >Delete All

Internet Explorer (Older versions) - Click Tools and then Internet Options. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies. Under History, click Clear History. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\username\Local Settings\T


You will need to access the Local Security Policy, To access Local Security Policy, open Control Panel, double-click on Administrative Tools, and double-click on Local Security Policy. Then, click Security Options in the right-hand pane and scroll down to Shutdown: Clear Virtual Memory Pagefile. Double-click that item and make sure it's enab


Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em


(By) Varun Kashyap, who is getting absent minded and forget to mention his name in the last two articles. And before he forgets, he would like to invite you to his TechCrazy Blog, where he writes about latest on the web, tech tips, tweaks and ha


You can also sort several different mails that you receive on a daily basis into one folder. For example set up a rule that catches all mail from MakeUseOf (Sender contains MakeUseOf.com), then set up a different rule within the same Filter for each of the other newsletters or eMail updates you would like to sort into the same fol


A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the "˜Do Not Show Hidden Files' option in the Folder Options-View settin


No matter how much of a geek you are, lets face it some information must NEVER EVER be given when on public computers. This includes credit card numbers, paypal accounts or any other personal informat


Tools for this - Use Windows On-Screen Keyboard (press Win + U and select On-Screen Keyboard) to enter the passwords or you can use KeePass Password Safe to store your passwords and then you can directly insert the password or copy/paste from KeePass so that you fool the keylog


Something like a computer in the corner will be just fine. This not only helps you to concentrate but more importantly from a security point of view it keeps shoulder surfers away from you. Needless to say don't enter passwords when some one is standing next to you, how uninterested he or she may pret


The free version of Cryptainer though only allows for 25MB of "˜vault' space per disk volume. So if you are looking to hide larger files, this isn't the answer.The free version is available for Windows Gaming setup|Https://windowsmastery.com/ 2000, XP, 2003, Vista from he


.

Portable Firefox - The Web Browser is your door to the Internet, so first and foremost secure it. Use the portable version of Firefox from you USB drive as opposed to the browser on the public compu


With a bit of discipline you can have the flood of eMails that are arriving in your inbox each and every day nicely sorted within minutes and you'll never again miss an important message that reaches your inbox totally unfilte


Or you can type the password randomly in a text file and then copy paste from there in random order. e.g to type MyPassword you could write rdPasswoMy and then copy paste in correct order(requires some work, I kn


If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved


In the folder, you will see all of the items that show up in the drop down. Most of these are actually shortcuts to those places, though a few are drives, commands to zip, or special system shortcuts to places like the Desktop or 'My Documents'. Because they're shortcuts, any other shortcuts you place in this folder will also show up in your Send To drop d

위로