One of the unadvertised features of 'Send To' is that you can directly change the items that show up in the list. This is done by going to a specific folder and changing its contents. That folder is found in "Documents and Settings/yourusername." Note: replace "yourusername" with whatever your user account name is on your computer. Here's what mine looks l
Click one of the computer names that you want to access. Choose "Remote Control" from the menu that shows up. Enter your buddy's password and you'll get remote access to that computer. The whole password situation used for Remote Control bothers me a bit. While this is fine if you are in a work/home scenario, this might not be a good idea in the "buddy" scenario as the Remobo password and the Remote Control password are the same. So if you know someone's remote control password, you know their account password. Kinda l
All in all a great application. There is the password issue that I mentioned and some dialogs that I feel are redundant, but overall it greatly simplifies the whole process or sharing files, using BitTorrent to send files, VPN setup and Remote Desk
If, for some reason, you want your start menu to delay for 900 milli-seconds, then you do not need to mess with this at all. If you do, though, want to speed up your computer just a little more then here is how you lower the menu de
Although not mandatory on all PCs, having some type of protection on your computer today is almost always a must. The problem that most tech savvy users have with them, is that most, just don't work and most eat up way to many resources. Having a way to actually test some of the options out there, is a fantastic way to make your final decision. So you try it out...Download the latest AVG, Symantec or NOD32 trial and see which comes out on top with each of these to
What happens when BitTorrent meets Hamachi meets remote desktop meets networking? Well you get something similar to Remobo (no longer available). Remobo lets you create an IPN which is an Instant Private Netw
I personally find JetPhoto Studio to be very helpful, and my Flickr free account is already showing the limitation nags. What's your personal favorite for all-in-one photo management tool? Spill everything in the comments be
SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows Security for gamers|https://windowsmastery.Com/ 2000, XP, 2003, Vista from he
Files are sent using BitTorrent. Click on "Send a File" and you will be presented with an option to choose the files and folders to share, choose them and specify if you want to share this one time only or keep it shared for longer. Remobo will now automagically create a torrent and send the torrent file to the other side (to the buddy). The other side can then download the torrent file and use any BitTorrent client to download the file. This increases in significance if you are sharing a file with a gr
Step 1: Go to "Start," "Run," (told you we use it a lot) and type regedit .Step 2: Navigate to the following: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionApps Path Step 3: Create a new folder/key under Apps Path. (Right-Click Apps Path and click "New," "Key.")Step 4: Title the new folder/key the name of the application, e.g. firefox.exe.Step 5: Right-Click the default string value (the thing automatically created in your new folder) and click Modify .Step 6: Change the value to the path of the executable you are attempting to run. E.g. C:Program FilesMozilla Firefoxfirefox.exe .Step 7: Create a new "String Value" by right-clicking under the default value (the thing we just edited) and select "New," "String Value." Name it Path and enter the value as the same path you previously ente
(By) Varun Kashyap, who is getting absent minded and forget to mention his name in the last two articles. And before he forgets, he would like to invite you to his TechCrazy Blog, where he writes about latest on the web, tech tips, tweaks and ha
Occasional snoopiness is the habit of man. The little world contained within our computers isn't safe from eavesdroppers. The need to feel secure probably explains the surplus of encryption software available. We all have some skeletons in our hard disks or just need to keep some valuable files away from prying eyes. We already have looked at a few ways to do it manually here on MakeUseOf. You can read about it here , here and he
Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your AV scanner to seek such h