Über mich
If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved
3. Now, go back to C:Test and look for your file or folder, it's not there! You cannot find it through simply browsing around, through the command prompt, or even if you click "Show Hidden Files and Folde
Another features most users will appreciate are the ability to create photo gallery - JetPhoto can easily make beatiful flash slideshows as well as lightbox web galleries, screensavers and desktop wallpaper, photo slideshow for presentation, and small images by resizing and cropping photo to fit most handphones and PDAs. Printing photo is also a snap either using your own printer or JetPhoto online printing serv
SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows 2000, XP, 2003, Vista from he
When Remobo starts, it asks you for the account details you just set up. Log in and then click on the button labelled "Menu" and then add one of your buddies on the Remobo network. You would have to enter the username of your buddy and your buddy will have to approve your request. This is unlike Hamachi where you create a network where others can j
4. To find the folder and it's contents again simply go back to the command prompt, type "CD C:Test" (of course, again replacing "Test" with the name of the folder,) and then type "attrib filename -s -h". You should now be able to find your file ag
A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the "˜Do Not Show Hidden Files' option in the Folder Options-View settin
Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows Game Installation|https://windowsmastery.com/ and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em
Tools for this - Although a simple Shift + Delete (please don't just delete) will do the trick but if you want to be totally sure that no one can access it then use: UltraShredder (It's Portable too) - or maybe you know of a better program that you can recomm
In order to be preventative, it would be nice to maybe give some of these products, which usually have a trial version, a run for their money before making the plunge and purchasing the full product. I've found a few tools to give each of these a test run, and see how well they actually are protecting
(By) Varun Kashyap, who is getting absent minded and forget to mention his name in the last two articles. And before he forgets, he would like to invite you to his TechCrazy Blog, where he writes about latest on the web, tech tips, tweaks and ha
What happens when BitTorrent meets Hamachi meets remote desktop meets networking? Well you get something similar to Remobo (no longer available). Remobo lets you create an IPN which is an Instant Private Netw
This virtual TrueCrypt volume can be kept hidden thus making the files invisible. TrueCrypt can also encrypt an entire drive, partition or even an external storage device like a USB drive. As further evidence of its capabilities, TrueCrypt can also encrypt the Windows boot partition or the entire boot drive. Furthermore it has the ability to create and run a hidden encrypted operating system. With these advanced features, TrueCrypt has become a power user's favorite t
All in all a great application. There is the password issue that I mentioned and some dialogs that I feel are redundant, but overall it greatly simplifies the whole process or sharing files, using BitTorrent to send files, VPN setup and Remote Desk
For simplicity - yes. For encryption - no. The application allows you to assign a password to a single LockBox folder. If you want to handle multiple files or folders, you have to pull everything into a master folder and lock it. The locked folder disappears from view and cannot be accessed by anyone without the password. The folder according to the developer's website is also not accessible remotely, through DOS or the safe m
. When the command prompt opens type "CD C:Test" (replace "Test" with the name of the folder you want to hide.)
2. Now type "attrib file +s +h" and replace "file" with the name of the actual file name you would like to h
Ort
Beruf