As you can see above, I cleaned out my folder so it only has a few items in it. Now I have the ability to create shortcuts to the Desktop, zip files, and send files to My Documents, My Pictures, and Screenshots. This last folder, 'Screenshots', I added by holding the Alt key while dragging Screenshots into the 'Send To' folder. This created a shortcut of the selected folder instead of moving it. If you don't feel comfortable with that hotkey, simply right click the desired item, click "New->Shortcut" and drag your new shortcut into the 'Send To' fol
In the folder, you will see all of the items that show up in the drop down. Most of these are actually shortcuts to those places, though a few are drives, commands to zip, or special system shortcuts to places like the Desktop or 'My Documents'. Because they're shortcuts, any other shortcuts you place in this folder will also show up in your Send To drop d
Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em
Important note: EICAR cannot be held responsible when these files or your AV scanner in combination with these files cause any damage to your computer. YOU DOWNLOAD THESE FILES AT YOUR OWN RISK. Download these files only if you are sufficiently secure in the usage of your AV scanner. EICAR cannot and will not provide any help to remove these files from your computer. Please contact the manufacturer/vendor of your AV scanner to seek such h
Although not mandatory on all PCs, having some type of protection on your computer today is almost always a must. The problem that most tech savvy users have with them, is that most, just don't work and most eat up way to many resources. Having a way to actually test some of the options out there, is a fantastic way to make your final decision. So you try it out...Download the latest AVG, Symantec or NOD32 trial and see which comes out on top with each of these to
SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows Game Mods|Https://Windowsmastery.Com/ 2000, XP, 2003, Vista from he
1. Go to "Start," "Run," and type regedit .2. Navigate to the following: HKEY_CURRENT_USERControl PanelDesktop 3. Find the key labeled "MenuShowDelay" and right-click, then click Modify .4. Change the value to whatever you like. (The range is 0-999 in millisecon
I talk a lot about Windows, and using the "Run" command is a large part of it. It is a simple and easy method of accessing programs quickly. If you happen to want to make a shortcut to an application your own way, guess what, you
A lightweight software at 477KB, Sofonesia Folder Protector requires .Net Framework to function. Beyond that, hiding the folders is a cinch. Just add multiple files to the protected folder's list and click. The software also does not encrypt the contents, it only hides the folder. Folder Protector also works in the Safe Mode. Password protection also has a failsafe in a "˜Forget password' hint quest
There are several different tests to run through. All attempting to try and take advantage of all the various activity that normal malware would. These tools are fantastic. Especially for a brand new system you may be setting up in a business or enterprise environm
Occasional snoopiness is the habit of man. The little world contained within our computers isn't safe from eavesdroppers. The need to feel secure probably explains the surplus of encryption software available. We all have some skeletons in our hard disks or just need to keep some valuable files away from prying eyes. We already have looked at a few ways to do it manually here on MakeUseOf. You can read about it here , here and he
Malware is a whole different ballgame, and is much more common and prevalent in today's "internet" world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it's always evolving, and many protective products can't always prevent malicious activity. However, that doesn't mean you shouldn't attempt to block
Remobo actually supports more than one PC per account, so you can have multiple entries under one buddy. This simply translates to the various computers of your buddy that you can access. This also means that you can use the same account on more than one computer. So you can have your work and home PC listed under the same usern