The ultimate freeware encryption program, TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive.
It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works hard to offer powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.
The useful tips in the extensive help manual and volume-creation wizard provide excellent guidance. In fact, they're required reading, as TrueCrypt lacks any considerable in-program help. For instance, the tutorial explains the entire concept beyond "hidden" volumes, but it doesn't quite explain how to mount them. One obvious downside of any strong encryption program is if you happen to forget your lengthy, secure password, you should consider any protected files as good as gone. However, once files are mounted to a local drive with your password or key, they conveniently behave just like any normal files, allowing you to easily open, copy, delete, or other modify them another way. Dismount the volume, and voila--your previously accessible files are now safely secure from prying eyes.
The apps newer features include hardware acceleration for some Intel chips, auto-mounting, and convenience improvements for when you "favorite" an encrypted volume have improved both performance and usability. Users can even create a hidden operating system, encrypted away from nosy busybodies, but make no mistake--TrueCrypt is not for the casual encryption explorer. Be sure to thoroughly understand what you're doing with the program before you do something regrettable.
You Can Get It Here
http://www.truecrypt.org/downloads
Enjoy
Search This Blog
Tuesday, 9 November 2010
Monday, 8 November 2010
Revo Uninstaller
Windows comes with a built in uninstaller which works well, but can leave remnants of a program on the hard drive and in the registry. Over time these remnants can slow a computer down. Revo Uninstaller not only uninstalls the program, but also hunts out additional folders, files and registry entries that a program may have created. The program also runs as a portable application directly from a USB drive.
There are three levels of registry searches to choose from, which find references to the program in the computer’s registry. Moderate search works for most people, but safe and advanced options are available.
For extra safety enable the options, “Make a System Restore point” before uninstalling a program and select to delete files to recycle bin, so accidental deletions are reversible.
You Can Get It Here
http://www.revouninstaller.com/revo_uninstaller_free_download.html
Enjoy
There are three levels of registry searches to choose from, which find references to the program in the computer’s registry. Moderate search works for most people, but safe and advanced options are available.
For extra safety enable the options, “Make a System Restore point” before uninstalling a program and select to delete files to recycle bin, so accidental deletions are reversible.
You Can Get It Here
http://www.revouninstaller.com/revo_uninstaller_free_download.html
Enjoy
Friday, 5 November 2010
Offline Gmail
Web-based email is great because you can check it from any computer, but there's one little catch: it's inherently limited by your internet connection. From public WiFi to smartphones equipped with 3G, from mobile broadband cards to fledgling in-flight wireless on airplanes, Internet access is becoming more and more ubiquitous -- but there are still times when you can't access your webmail because of an unreliable or unavailable connection.
Once you turn on this feature, Gmail uses Gears to download a local cache of your mail. As long as you're connected to the network, that cache is synchronized with Gmail's servers. When you lose your connection, Gmail automatically switches to offline mode, and uses the data stored on your computer's hard drive instead of the information sent across the network. You can read messages, star and label them, and do all of the things you're used to doing while reading your webmail online. Any messages you send while offline will be placed in your outbox and automatically sent the next time Gmail detects a connection. And if you're on an unreliable or slow connection (like when you're "borrowing" your neighbor's wireless), you can choose to use "flaky connection mode," which is somewhere in between: it uses the local cache as if you were disconnected, but still synchronizes your mail with the server in the background.
To Activate
1. Click Settings
2. Click Offline
3. The Select Enable Offline Mail for this computer
4. Click Save Changes.
Enjoy
Once you turn on this feature, Gmail uses Gears to download a local cache of your mail. As long as you're connected to the network, that cache is synchronized with Gmail's servers. When you lose your connection, Gmail automatically switches to offline mode, and uses the data stored on your computer's hard drive instead of the information sent across the network. You can read messages, star and label them, and do all of the things you're used to doing while reading your webmail online. Any messages you send while offline will be placed in your outbox and automatically sent the next time Gmail detects a connection. And if you're on an unreliable or slow connection (like when you're "borrowing" your neighbor's wireless), you can choose to use "flaky connection mode," which is somewhere in between: it uses the local cache as if you were disconnected, but still synchronizes your mail with the server in the background.
To Activate
1. Click Settings
2. Click Offline
3. The Select Enable Offline Mail for this computer
4. Click Save Changes.
Enjoy
Saturday, 30 October 2010
Bugmenot
Registering with a Web site often means making a deal with the devil. You give the site information like your name, email address, and potentially more private data such as your mailing address, phone number, and age. But what happens with that information? You may get inundated by spam, your name may be sold to mailing lists and advertisers, and possibly worse. But for many Web sites, if you don't register, you can't log in and use the site.
"How To Use BugMeNot.com
STEP 1: Make a note of the website address your are trying to access. E.g nytimes.com
STEP 2: Visit bugmenot.com
STEP 3: Enter the address from step 1 into the box and press the "Show Logins" button
STEP 4: You should now be presented with a username and password. Make a note of them.
STEP 5: Go back to the site you were originally trying to access in step 1 and proceed to login with the username and password you noted in the previous step.
With any luck you should be able to access your article now!
Important Notes
It's important to note that all of the username/password accounts listed on bugmenot are added by users such as yourself. If you can't find a working login for a site then you are encouraged to register with that site (using fake details of course) and then add the username/password to bugmenot for other users to use. Never enter your real login details into bugmenot- everyone else will be able to see them!
If you find bugmenot useful then please return the favour by telling everyone you know about it. Together we can take back the web."
http://bugmenot.com.
Enjoy
Friday, 29 October 2010
Cyber Ghost VPN
"Cyber Ghost VPN is a VPN client offered by S.A.D. GmbH and their servers are based in Germany. They use 128-bit AES encryption on all connections to ensure a high level of anonymity and use data compression to make connections to their servers faster.
For their free service, they offer 1 GB a month which is more than enough for surfing the web. You must register in order to use this service.
It's GUI is very basic. attractive and user-friendly. They have just recently hit a half million users and are growing fast. I am very pleased with this product. It's well worth a look."
Anonymity services safely transmit information with little risk of local interception, making them ideal for surfing on open Wi-Fi networks or in hotels while traveling.
http://cyberghostvpn.com/de/produkt/herunterladen.html
Enjoy
For their free service, they offer 1 GB a month which is more than enough for surfing the web. You must register in order to use this service.
It's GUI is very basic. attractive and user-friendly. They have just recently hit a half million users and are growing fast. I am very pleased with this product. It's well worth a look."
Anonymity services safely transmit information with little risk of local interception, making them ideal for surfing on open Wi-Fi networks or in hotels while traveling.
http://cyberghostvpn.com/de/produkt/herunterladen.html
Enjoy
Thursday, 28 October 2010
WinDirStat
Have you ever sorted a folder by file size, hoping to track down a hard disk hog, only to be frustrated by the fact that Windows doesn’t let you see the size of nested folders’ contents? So have we, and that’s why we make sure that we’ve always got WinDirStat close at hand.
WinDirStat, short for Windows Directory Statistics, is an application which analyzes the composition of your hard drive, allowing you to identify which files are eating up your disk space. It presents this information in a size-ordered directory view, or as a colorful treemap, making it a snap to see exactly what is using up your hard drive space. Once you’ve figured out which files are taking up more than their fair share of your drive, you can get rid of them with WinDirStat’s built-in cleanup operations.
You Can Get It Here
http://sourceforge.net/projects/windirstat/
Enjoy
Wednesday, 27 October 2010
Zum
A great application launcher combining ease of use, artistic design and minimalist features, Zum is a must-have if you want to keep your Windows desktop clutter-free. You won’t need any application shortcut on your desktop ever again once you start using Zum.
The interface can be minimized to system tray and you can launch your shortcuts from there. For each entry you add (save for website addresses) you can add command line arguments. Zum comes with a set of good looking skins, but also offers you the chance to create your own backgrounds to add to the list
You Can Get It Here
http://www.softpedia.com/progDownload/zum-Download-153211.html
Enjoy
The interface can be minimized to system tray and you can launch your shortcuts from there. For each entry you add (save for website addresses) you can add command line arguments. Zum comes with a set of good looking skins, but also offers you the chance to create your own backgrounds to add to the list
You Can Get It Here
http://www.softpedia.com/progDownload/zum-Download-153211.html
Enjoy
Tuesday, 26 October 2010
AutoPatcher Updater
Update Windows Offline On Multiple Systems
AutoPatcher Updater is a useful tool if you have to install Windows updates on multiple systems, and want to preserve precious bandwidth in downloading the updates to ever system individually, or save time, or both. This tool downloads updates for any version of Windows from Microsoft’s servers, and makes offline installation possible on any system running that version of Windows. Must have for people managing large networks.
You Can Get It Here
http://www.autopatcher.com/
Enjoy
AutoPatcher Updater is a useful tool if you have to install Windows updates on multiple systems, and want to preserve precious bandwidth in downloading the updates to ever system individually, or save time, or both. This tool downloads updates for any version of Windows from Microsoft’s servers, and makes offline installation possible on any system running that version of Windows. Must have for people managing large networks.
You Can Get It Here
http://www.autopatcher.com/
Enjoy
Monday, 25 October 2010
Google Desktop
Google Desktop makes searching for files stored on your computer as easy as searching the web with Google. It's a desktop search application that provides full text search over your email, files, music, photos, chats, Gmail, web pages that you've viewed, and more. By making your computer searchable, Desktop puts your information easily within your reach and frees you from having to manually organize your files, emails and bookmarks.
Google Desktop doesn't just help you search your computer; it also helps you gather new information from the web and stay organized with gadgets and sidebar. Google Gadgets can be placed anywhere on your desktop to show you new email, facebook notifications, weather, photos, personalized news, and more. Sidebar is a vertical bar on your desktop that helps you keep your gadgets organized.
You Can Get It Here
Enjoy
SpyPig
Now you can find out when your email has been read by the recipient! No more guessing: "Has he or she read my email yet?"
SpyPig is a simple email tracking system that sends you a notification email as soon as the recipient opens and reads your message.
It works with virtually all modern email programs: Outlook, Eudora, Yahoo Email, Gmail, Hotmail, AOL Email and many others.
Best of all, SpyPig is FREE! No spam, no virus, no adware, no spyware. You can use it as often as you like, and there's no catch. Just introduce the Pig to all your friends!
You can get it here
http://www.spypig.com/
Enjoy!
Subscribe to:
Comments (Atom)