How to Embed Hidden Messages in Picture Files (OS X)
Yes, just like in the movie Along Came a Spider, you too can hide messages inside of jpg, gif, png and other picture files. …
How to Embed Hidden Messages in Picture Files (OS X)Read More »
Yes, just like in the movie Along Came a Spider, you too can hide messages inside of jpg, gif, png and other picture files. …
How to Embed Hidden Messages in Picture Files (OS X)Read More »
This guide contains a list of super-helpful portable Apps that you can run directly from a USB thumb drive to help troubleshoot PC’s. If you’re the one that friends and family call every time they have a problem with their computer, this list is for you. …
If you’ve tried to install recommended updates in Windows Vista, and receive error 800B0100, this tutorial offers the most common solution to that problem.
…
How to resolve Windows Vista Update error 800B0100Read More »
This guide will explain step by step through the process to securely store files in Windows, so that you and only you can access them. …
This tutorial will guide you through the process to recover files that you may have accidentally deleted from your Windows computer, using completely free software. …
How to Recover Previously Deleted Files in WindowsRead More »
If you’ve lost your Windows password and you’re locked out of your computer, you can use the Ophcrack LiveCD to recover your password(s). This tutorial will guide you through doing just that. …
This tutorial will guide you in using Darik’s Boot and Nuke (“DBAN”) – to securely wipe (delete) all of the data from your hard drive. Why would you want to securely wipe all of the data on your drive? Perhaps you’re selling your computer, donating it to charity, or recycling it. Before you do so, consider this – even when you delete files, they’re not actually removed from your hard drive. Using data recovery tools, many files can be restored from the average hard drive. In fact, even after a hard drive has been formatted, data can be recovered from it. Using DBAN “prevents or thoroughly hinders all known techniques of hard disk forensic analysis”. …
How to completely wipe all of the data from your hard driveRead More »
This tutorial will guide you in installing, setting up and using Tor in macOS – to help keep your identity completely private and surf the web anonymously. …
This guide will explain step by step how to run Windows apps in a completely safe and isolated environment (a “sandbox”) so that anything that happens while you’re using that app is completely separated from Windows itself. …
This step by step guide will show you how to “allow” a program to access the Internet when the Windows Vista Firewall is enabled (which is by default). …
How to Allow a Program Through the Windows Vista FirewallRead More »
Why should you disable Remote Assistance and Remote Desktop? Because either service could be used or exploited by an attacker to gain remote access to your system. The steps to disable these services are outlined below.. …
How to disable Remote Assistance and Remote Desktop in Windows XPRead More »
Here are 5 quick steps to help you secure your wireless network from unauthorized access. These steps are provided as general guidelines – for detailed help, please contact your hardware vendor. See the bottom of this page for links to some common wireless networking vendors. …