사이트 로그인
2026.01.21 07:21
For simplicity - yes. For encryption - no. The application allows you to assign a password to a single LockBox folder. If you want to handle multiple files or folders, you have to pull everything into a master folder and lock it. The locked folder disappears from view and cannot be accessed by anyone without the password. The folder according to the developer's website is also not accessible remotely, through DOS or the safe m
The above tools are handy for running hard drive backups to another partition, external drives or your own FTP server. However if you want to backup only a handful of files and store them on reliable third party servers then you can try a free online backup service called Mozy . It's quick to configure, fully automated and available both for Mac and Windows PCs. The only problem is that the free account gives you only 2 GB of storage space. See all Mozy features h
CCleaner : In case you're wondering, the extra "c" stands for "crap" and it is a very apt name as this program really does clean out the crap that accumulates in your hard-drive. Whether it is temp files, internet browser history, cookies, caches or needless registry entries, CCleaner finds them and deletes them. Just tick in the boxes what you want nuked and what you want left, and CCleaner does the rest - fast.
Before deleting anything from the registry, CCleaner gives you the option of making a back-up file in case anything of importance suddenly fails to start work
SyncBack - We have already covered the SyncBack backup tool earlier, but basically, it's another backup software. Although the app has both free and paid versions, the free one has enough features for running local back
For the adventurous ones, this application also comes with JetPhoto Server [No Longer Available] - a full-featured digital photo publishing service software based on PHP. With JetPhoto Server, anyone can establish his or her own standalone theme photo website quickly and fre
Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows gaming guide|https://windowsmastery.com/ and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em
I personally find JetPhoto Studio to be very helpful, and my Flickr free account is already showing the limitation nags. What's your personal favorite for all-in-one photo management tool? Spill everything in the comments be
But then a serious virus infection almost destroyed the hard drive and I realised I was being stupid and things had to be tightened up. Ever since then, I have been paranoid about keeping the computer clean from viruses and making sure everything is tidy, organised and fast. Now today I make sure the following programs are updated daily and are used at least every second day. Knocking on wood, I haven't had a computer virus in four years or a spyware infection in two years. I am also a speed-freak, tweaking everything to make things go fas
Back in 2002, my computer was drowning. Drowning in countless start-up programs, temp files, cookies, caches, out-of-date Windows Registry entries, viruses, spyware....you name it, I had it. The Windows trash bin was full to bursting and the Clipboard was jam-packed. After only really embracing the internet in a big way the year before, I was having the time of my life, downloading and installing everything I could get my hands on. An executable email attachment called "Naked Britney Spears"? I'll take that! A complete stranger telling me to download his "special new program"? Sure thing! Yes I was naive and very stupid back t
Dynamic - This acts as a SOCKS proxy that can be used to tunnel traffic through the network where the SSH server resides. You can then configure applications that support SOCKS proxies (such as a web browser) to take advantage of it. I'll demonstrate how to set up Firefox to work through a dynamic tun
It's up to you how you want Search to work, but I suggest you optimise it to suit just the files you will always be wanting to call up quickly. If you do need to search for other rarely needed files or system folders the Search will still find them, just a little slo
If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved
SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows 2000, XP, 2003, Vista from he