Konga

Thursday, August 21, 2014

Disguise and hide your sensitive folders with ‘Disguise Folders’ for Windows 7

Everyone has documents and files of sensitive nature that they would like to keep away from prying eyes. Users have a handful of options to do this, ranging from the most secure, such as mounting virtual archives using programs like TrueCrypt, physically encrypting and reprocessing files, or hiding and embedding them within other larger files …  to less secure options that merely hide files cosmetically.

Protect and encrypt your folders and data with A+ Folder Locker Free Edition

Keeping your data private can be a challenge.There is always a risk of getting ones PC hacked and various other security breaches. With A + Folder Locker Free edition you can protect your data at the right click of the Windows context menu.

Get a military grade, secure password vault on your desktop or device with Ever Password



EverPassword is a great tool that will manage your passwords for various websites, as well as other private information such as credit card and bank account information. It uses a 256 bit encryption to keep your data secure, can sync data across more than one device or platform, and it’s free for anyone to download and use

Surf the net anonymously and go around firewalls and geo-restrictions with Ultrasurf

Ultrasurf is free, proxy-based ‘anti censorship’, ‘pro-privacy’ software. It tunnels through firewalls (whether at work or country-wide), encrypts online communications, hides your real IP from the websites that you are visiting, automatically deletes your browser history, and provides you with a US-based location so that you can access geographically restricted websites such as Hulu or Pandora.

Protect your PC from data theft by USB or CD, with “URC Access Modes”

If you are a business, public venue, or even a normal user concerned with the illegitimate copying or transfer of files or data from your computer(s) via USB or CD, then this program is for you.
‘URC Access Modes’ is a FREE program that will allow you to shut off and password protect USB and CD access on any machine that you have administrator access to.

Wednesday, August 20, 2014

8 Reasons to Install CyanogenMod on Your Android Device


cyanogenmod-11-home-screen-on-nexus-7-2013
CyanogenMod is the most popular custom ROM for Android devices. While it’s an unofficial build of Android, it probably provides an experience closer to Google’s original vision than the software on your current Android phone or tablet does!
We used CyanogenMod 11 for this article. If it supports your device, it’s easier than ever to install thanks to the CyanogenMod installer app.

How to Record a Phone Call on Your Android Phone


00_lead_image_call_recorder
Ever wished you had recorded a call? Maybe you got bad customer service from a company over the phone and you want proof. Or, maybe you received training or help that you want to reference again in the future.

Friday, August 15, 2014

VIDEO: How To Install Rear View Reverse Backup Camera on Car


Be Prepared: Create a Recovery Drive for Windows, Linux, Mac, or Chrome OS


recovery-usb-drive-and-cd
Computers don’t come with operating system installation CDs anymore. If your operating system won’t boot, you’ll need a bootable recovery drive to fix it. All operating systems allow you to create these.
These recovery drives provide access to the same recovery options your operating system includes. You can always create them later, although you may need access to a computer running the same operating system.

How to Password-Protect a Printer

If you share a computer, you might want to limit who can use it to print. Unauthorized printing gives others the opportunity to walk away with digital material, and it wastes resources like ink and paper. Luckily, you have a couple of ways to secure your printer without compromising your own ability to print.

Set a Password













Tuesday, August 12, 2014

How to See What Web Sites Your Computer is Secretly Connecting To


image
Has your Internet connection become slower than it should be? There may be a chance that you have some malware, spyware, or adware that is using your Internet connection in the background without your knowledge. Here’s how to see what’s going on under the hood.
It’s worth noting that most third-party firewalls will probably give you this same type of information as well as block things that are trying to connect… unless the applications managed to add an exclusion already. Better check anyway.

Monday, August 4, 2014

3 Free Norton Ghost Alternatives to Create a Full Windows Image Backup

If you’re constantly testing software, trying out new Windows settings or tweaks or even purposely infecting your own machine with malware, it’s essential to have a complete copy of your Windows partition to hand so you can quickly restore it to its exact state to before you started messing around. Even if you don’t use your computer very often or for those things, a full backup could save you time and money, reinstalling Windows and all your applications again would be a long, laborious and possibly expensive process.

How to Open the Command Prompt as Administrator in Windows 8.1


00_lead_image_admin_command_prompt
Normally, the command prompt can be opened as a regular user to run commands that don’t require administrative rights. However, if you need to run a command that requires administrative rights, you must open the command prompt window as administrator.

Why is Google Services Draining So Much Battery on Android?


google-services-or-google-play-services-battery-drain
Google Services shows up on Android’s Battery statistics screen as one of the many things draining your battery. It can sometimes drain an excessive amount of battery power, but you can solve this problem.
“Google Play Services” used to appear on Android’s battery screen as its own entry, and it was a big battery hog for some people. Google Play Services is now just one part of the Google Services app.

Click For More Info