Clicking on "View Shared Files" will open up a webpage that allows you to view all the shared files (yours and others') and also allows you to browse the files categorized by usernames so that you know who is sharing which fi
Comodo has different backup modes: copy, move and synchronization. So apart from simply copying/moving the files from one place to another you can set Comodo to keep source and backup copy synchronized. That is to say, whenever you make some changes to the original files the changes will be replicated on your backup c
Something like a computer in the corner will be just fine. This not only helps you to concentrate but more importantly from a security point of view it keeps shoulder surfers away from you. Needless to say don't enter passwords when some one is standing next to you, how uninterested he or she may pret
Basically you can run any 3rd party application atop of Remobo. Want to play any game with your buddy just like you would have played it on the LAN? Easy, hover your mouse over the buddy name and get the IP. This is the virtual IP or the Remobo IP. Use this for streaming media configuration or playing games over the netw
What happens when BitTorrent meets Hamachi meets remote desktop meets networking? Well you get something similar to Remobo (no longer available). Remobo lets you create an IPN which is an Instant Private Netw
The above tools are handy for running hard drive backups to another partition, external drives or your own FTP server. However if you want to backup only a handful of files and store them on reliable third party servers then you can try a free online backup service called Mozy . It's quick to configure, fully automated and available both for Mac and Windows PCs. The only problem is that the free account gives you only 2 GB of storage space. See all Mozy features h
Comodo Backup [No Longer Available] is an excellent backup utility from the creators of Comodo Firewall. It's free, easy to use and have everything you might need. You can easily backup your local files and folders to anywhere on your computer, network, DVD / CD or even FTP server. Plus it can be set to run automatically on specified time interv
Click one of the computer names that you want to access. Choose "Remote Control" from the menu that shows up. Enter your buddy's password and you'll get remote access to that computer. The whole password situation used for Remote Control bothers me a bit. While this is fine if you are in a work/home scenario, this might not be a good idea in the "buddy" scenario as the Remobo password and the Remote Control password are the same. So if you know someone's remote control password, you know their account password. Kinda l
The source port you use for setting up the tunnels is arbitrary. We could have used 1234 instead of 3390 if we wanted to, as long as nothing is running on the local machine at port 1234. What is not arbitrary is what you use on the destination IP and port. For that you will need to use the proper IP address and port for the service you wish to connect
A small and simple program that locks-unlocks directories/folders/files on a NTFS volume. Using the hide option, the folder can be made invisible (enable the "˜Do Not Show Hidden Files' option in the Folder Options-View settin
Next, let's set up the local tunnel for the computer on the network running Windows Remote Desktop. Let's say the local IP addresses on the LAN where the SSH server resides are 192.168.1.xxx addresses. The Windows machine has a local IP of 192.168.1.100. Enter 3390 for the Source port , 192.168.1.100:3389 for the Destination , select Local for the port type, and then click the Add button. You'll see later why I've configured the source port to be different than the destinat
The reason we set up the source port to 3390 is because the Remote Desktop Client will not allow you to connect to the default remote desktop port (3389) on the local machine. So that's why we used 3390 instead (we could have used any port, I just use 3390 because it's easy for me to rememb
.
Portable Firefox - The Web Browser is your door to the Internet, so first and foremost secure it. Use the portable version of Firefox from you USB drive as opposed to the browser on the public compu
WARNING : BEFORE making any changes to the Windows registry, it is highly recommended to make a backup in case anything goes wrong. To backup your Windows Multiplayer Setup|Https://Windowsmastery.Com/ registry, tap your Windows key on the keyboard and "R". When the Run box comes up, type regedit . When the Registry box comes up, go to 'File' then 'Export'. Save the resulting file to your hard dr
If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved