7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol
4. To find the folder and it’s contents again simply go back to the command prompt, type “CD C:Test” (of course, again replacing “Test” with the name of the folder,) and then type “attrib filename -s -h”. You should now be able to find your file ag
To publish album to your web server, you can use WebSync. All uploaded pictures will be resized and stamped with watermark automatically while publishing. Once the album is published on web server, user can continually modify its content easily in JetPhoto Studio. The web-side online album will be updated and synchronized with the local album automatically, as long as WebSync is acted ag
Malware is a whole different ballgame, and is much more common and prevalent in today’s “internet” world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it’s always evolving, and many protective products can’t always prevent malicious activity. However, that doesn’t mean you shouldn’t attempt to block
3. Now, go back to C:Test and look for your file or folder, it’s not there! You cannot find it through simply browsing around, through the command prompt, or even if you click “Show Hidden Files and Folde
As you can see above, I cleaned out my folder so it only has a few items in it. Now I have the ability to create shortcuts to the Desktop, zip files, and send files to My Documents, My Pictures, and Screenshots. This last folder, ‘Screenshots’, I added by holding the Alt key while dragging Screenshots into the ‘Send To’ folder. This created a shortcut of the selected folder instead of moving it. If you don’t feel comfortable with that hotkey, simply right click the desired item, click “New->Shortcut” and drag your new shortcut into the ‘Send To’ fol
The free version of Cryptainer though only allows for 25MB of “˜vault’ space per disk volume. So if you are looking to hide larger files, this isn’t the answer.The free version is available for Windows 2000, XP, 2003, Vista from he
[NO LONGER WORKS] Spycar attempts to hijack your system, similar to typical malware activity and gives your protection a test. Spycar does not include any “exploits”, so you do have to click OK during the process for the test to take affect. If your preventative software is successful during the process, a built-in TowTruck application responds with a rating on your prevention and then returns your system to it’s original st
. When the command prompt opens type “CD C:Test” (replace “Test” with the name of the folder you want to hide.)
2. Now type “attrib file +s +h” and replace “file” with the name of the actual file name you would like to h
Notice that the Send To folder is somewhat transparent, indicating it is a hidden folder. If your hidden folders are not visible, go into “Tools->Folder Options->View (Tab)->Show Hidden Folders.” Once you have done this you are ready to go into your Send To fol
For the adventurous ones, this application also comes with JetPhoto Server [No Longer Available] – a full-featured digital photo publishing service software based on PHP. With JetPhoto Server, anyone can establish his or her own standalone theme photo website quickly and fre
An IT security group based in Europe called Eicar has come with a few different tools to test the effectiveness of your preferred AntiVirus application. There a few individual files to download and run, along with a ZIPPED file that will test your AV software and their ability to scan for viruses deeply embedded into other files. I should point out that Eicar does have a disclai
A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the “˜Do Not Show Hidden Files’ option in the Folder Options-View settin
Local – A local tunnel will allow you to connect to the specified port on a machine residing on the same network as the SSH server. One useful example that I will show you is how to connect to a Windows game performance tips|https://Windowsmastery.com/ computer running Remote Desk
Occasional snoopiness is the habit of man. The little world contained within our computers isn’t safe from eavesdroppers. The need to feel secure probably explains the surplus of encryption software available. We all have some skeletons in our hard disks or just need to keep some valuable files away from prying eyes. We already have looked at a few ways to do it manually here on MakeUseOf. You can read about it here , here and he
Now you have to configure your applications to use the tunnels you have set up. Let’s say you want to do your web browsing through the dynamic tunnel we set up. This is actually an extremely useful way to take advantage of



