1. Go to "Start," "Run," and type regedit .2. Navigate to the following: HKEY_CURRENT_USERControl PanelDesktop 3. Find the key labeled "MenuShowDelay" and right-click, then click Modify .4. Change the value to whatever you like. (The range is 0-999 in millisecon
In order to be preventative, it would be nice to maybe give some of these products, which usually have a trial version, a run for their money before making the plunge and purchasing the full product. I've found a few tools to give each of these a test run, and see how well they actually are protecting
The majority of the time you end up relying on on another product to get the annoyingware off of your machine. So now you've got a $60 bloated product eating up resources on your machine and doing absolutely nothing to protect
This virtual TrueCrypt volume can be kept hidden thus making the files invisible. TrueCrypt can also encrypt an entire drive, partition or even an external storage device like a USB drive. As further evidence of its capabilities, TrueCrypt can also encrypt the Windows boot partition or the entire boot drive. Furthermore it has the ability to create and run a hidden encrypted operating system. With these advanced features, TrueCrypt has become a power user's favorite t
There are several different tests to run through. All attempting to try and take advantage of all the various activity that normal malware would. These tools are fantastic. Especially for a brand new system you may be setting up in a business or enterprise environm
For advanced calculation, you will need to use variables to hold calculation results. SpeedCrunch allows you to define as many variables as you want. There are also pre-defined variables such as pi that you can use off- h
In access of the above features, SpeedCrunch allows you to save your session so that you can resume from where you stopped the last time. Your history and variables will be intact the next time you load up the sess
Now when you first saw this tool, if you even noticed it at all, you probably thought it was pretty terrible. Most of the locations on the list, by default, are fairly useless. The only way I ever used 'Send To' in the past was to create shortcuts and put them on the Desktop. What you see above is my newly cleaned-up and customized 'Send To' m
The free version of Cryptainer though only allows for 25MB of "˜vault' space per disk volume. So if you are looking to hide larger files, this isn't the answer.The free version is available for Windows 2000, XP, 2003, Vista from he
If, for some reason, you want your start menu to delay for 900 milli-seconds, then you do not need to mess with this at all. If you do, though, want to speed up your computer just a little more then here is how you lower the menu de
I talk a lot about Windows, and using the "Run" command is a large part of it. It is a simple and easy method of accessing programs quickly. If you happen to want to make a shortcut to an application your own way, guess what, you
SuperStorm can also be easily run from a USB Drive as it is a self extracting application. The only limitation that the freeware version of SuperStorm has is that it can only handle file sizes of up to 1MB for encryption. Also, the freeware version lacks a password protection feature for the hidden file.The 623KB software is available for Windows emulator guide|https://windowsmastery.com/ 2000, XP, 2003, Vista from he
Step 3: Change the following values to whatever you like: TITLE HERE - Add the text that you want to be shows, ex. John's PC ICON HERE - The image that is used as a brand logo. It must be a .ico and 24x24. ( E.g. C:\mylogo.ico. The has to be replaced by two \'s. ) FUNCTION HERE - This should be replaced with the function that will be used when clicked. ( E.g. A website, a windows executable, etc. http://google.com will redirect to Google when clicked. )Step 4: Save the file as brand.reg and double-click it. Now, simply log off and back on and you should have your own branded version of Wind
If you think that freeware and industrial strength file security can never meet, the open source TrueCrypt could prove you wrong. TrueCrypt not only encrypts data (using 256-bit AES and 448-bit Blowfish algorithms) but also cloaks the files in hidden volumes. TrueCrypt functions by creating a virtual encrypted disk which appears as a real disk volume. Files can be encrypted on the fly when moved into this volume and decrypted when moved
Constants library - If you have difficulties remembering the value for atomic mass or astronomical units, don't worry, it is all documented in the constants library. This library contains most of the constant values you will ever n
Cryptainer is a near twin to Cryptainer. It has a similar intuitive interface and follows the same process of secured protection. It similarly creates encrypted drives which can only be accessed by a password. When the drive is unloaded, it disappears from Windows and can only be accessed with the password. Similar to the aforementioned software, self decrypting files can also be sent to others through em