Making technology work for you...

Get Your Free Subscription By Email:

Sneaksy - Minimalistic Password-Protected Hidden Folder Solution

Sneaksy is a super-minimalistic, hidden folder solution which protects sensitive data from unauthorized access. The portable and open-source application works on Windows XP, Windows Vista, Windows 7 and Windows 8 platforms. Sneaksy is very simple to use, just download and launch to get started - there is no UI as such, on first run a small red-box will display on top-left corner of the screen where user inputs the desired password which will be visible so you can confirm what is entered. On subsequent runs you will need to use this password and it will no longer be shown, pressing enter will further shrink the password prompt in the corner unlocking the "Files" folder on desktop allowing authorized access. Click on the only visible "Red" handle in the corner to lock and hide the folder and exit the application.


Clover Adds Wings To Windows Explorer

A long ago we shared free utility WindowsTabs which allowed users to enjoy tabbed file-browsing in Windows explorer. "Clover 3" is another such new utility, which brings Google Chrome styled tabs to Windows Explorer. The free Windows explorer extension enables multi-tab functionality similar to Google Chrome browser with a convenient bookmark toolbar for fast access to frequent locations on file-system, support for controlling tabs using keyboard shortcuts further enhance it's usability to get file-explorer tasks done quickly.

Tabbed Windows Explorer

How to convert .CDR to .ISO and make a bootable USB disk

File-format incompatibility between Apple Mac OS and Microsoft Windows operating-systems is something every user faces utilizing both operating-systems. One such incompatibility is the disk-image format used by both operating-systems, while Apple Mac OS uses .CDR format Microsoft Windows utilizes the international disk-imaging standard .ISO, so you would need something to convert .CDR to .ISO file-format and vice-versa to use them under rival operating-systems. Luckily, the only difference between two is the file-extension, and all one needs to do is to change the .ISO/.CDR extension to make them work interchangeably without any real file-format conversion. We can also use this fact to make perfectly bootable USB disks from .CDR files from Windows and Linux using existing tools allowing cloning of .ISO format to USB.


Firest0rm - Another Apple iOS 6.1.4 Jailbreak Scam

Scamming users looking for Apple iOS 6.1.3+ jailbreak is something we covered earlier, and it seems the trend is here to stay with another entry named Firest0rm claiming to offer untethered Jailbreak for iOS 6.1.4 & even iOS 7. Using the same modus-operandi as earlier, the perpetrators of this scam asks users to download their utility asking them to complete a survey to unlock the zip file containing the Apple iOS 6.1.4 and iOS 7 untethered jailbreak which is nothing but fake/dummy. This is not all, as suggested by many comments in the previous post this could even be a virus/malware and can harm users computers - so the bottom line is stay from it.

Firest0rm Jailbreak

Solution For iPhone Stuck In Dock Connector Mode Leaving Phone Without Audio

Apple iPhone is a great piece of technology and like any other gadget can be the source of little annoyances which are simple but tricky to solve, one such commonly encountered problem is when your iPhone thinks it's always connected to a dock and no sound comes out of the device speakers as it diverts all audio to the phantom Dock Connector. Once stuck into the "Dock Connector" mode the volume slider becomes nonoperational and no audio comes out from internal speakers with no option to change the behavior and route audio to internal speakers.

iPhone Dock Mode

Installing And Configuring Google Android 4.3 x86 On VirtualBox For Better Performance

The quick and dirty Google Android 4.3 installation instructions for Windows shared earlier were not perfect and resulted in slow performance. Free virtualization utility Virtualbox offers an superior alternative to QEMU based virtualization used in the previous approach offering much superior working experience and performance benefits. Here's a complete picture-guide to get Google Android 4.3 x86 working in Windows using Oracle VirtualBox.

Google Android 4.3 inside virtualbox

Google Goes Nasty With Gmail Inbox Advertisements, Microsoft Taunts With New Scroogle And We Tell You How To Get Rid of Them

The new Gmail Tabbed interface introduced a few months ago turned out to be the part of a bigger advertisement revenue earning strategy by Google, the new design is now spawning targeted ads right into your inbox disguised as genuine emails. Whether this is SPAM (which is basically unsolicited emails) or not, nobody is liking the new move from Google. Microsoft took no time to make another video in their Scroogled by Google campaign which can be watched after the "Read more" link below with a working tip to get rid of these invasive inbox advertisements.

media reports on gmail advt

A Working Noob Friendly Facebook Exploit Which Allows Any User To Gain Full-Access To Other Facebook Accounts

Today I received the below email with subject "Confirm your ownership of" asking me to claim my facebook email address, first it seemed like an phishing email but on closer inspection of links and sender headers it turned out to be a genuine email with correct links and real facebook as sender. I was pretty sure there was something fishy and on researching the target link I discovered a recent working exploit for facebook which only got public on June,14 2013 and was used by someone to try and hack my facebook account. This noob friendly hack exploits a critical vulnerability in Facebook which allows a hacker to easily take complete control over any Facebook account if victim clicks the link while logged into Facebook.

Easiest And Fastest Way To Use Traffic Shaping On Linux

We demonstrated how to use Raspberry Pi as an home-automation server with voice commands using SiriProxy earlier, since Apple Siri (and SiriProxy) needs an good active internet connection to convert speech-to-text for recognizing commands this failed due to limited bandwidth availbility when using Raspberry Pi as an 24x7 downloading server. After a lot of research, I made a simple shell script which prioritizes our SiriProxy traffic over others only when needed, utilizing full-bandwidth for downloads when not in use.

Linux traffic priority example using TC

Digital Carjackers Show Off New Attacks

Mainstream usage of self-driven cars could be years away, but technology is rapidly making it's way into automobile industry and with that it brings the menace of security breach or hacking. A couple of hackers show off a series of nasty new attacks on cars to forbes and shared them on video for everybody, do watch the video posted below.

Car Hacking
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.