Software

warning: Creating default object from empty value in /home/samaycsa3940/public_html/modules/taxonomy/taxonomy.pages.inc on line 33.
Articles about Software, Software reviews

What is Visual Cryptography

What is Visual CryptographyYou have come across pictures and symbols like this, but you have often ignored them because either they don't make sense to you or second, you thought that this some sort of cryptic computer scan code. Well, pictures like these are not just white noise, often a part of visual cryptography. Visual Cryptography is a system by which information such as picture and text can be decrypted without the use of a computer, visually by just human eye. Visual Cryptography often consists of two or more pieces such as pictures or parts of text, which as an individual piece do not make any sense. However, when combined with the second or more pieces of the Visual Cryptogram, reveals a message, picture or another form of sensible information. In this article we will discuss visual cryptography and demonstrate it using some examples.

How to use Credentials Manager in Windows Seven

Credentials Manager in Windows SevenWindows Seven has a cool new feature called Credentials Manager. Credentials Manager safeguards all your Windows and other passwords that you provide to them and even auto fills them when needed. You often map network drives, go to secure websites etc that need a login and a password, credentials manager can store these for you. Whats really cool is that you can backup and restore your Credentials Manager Vault or copy it to another computer. When you copy the vault to another computer, you do not have to remember and provide credentials for resources, network drives or web pages that are already stored in the Credentials Manager. Its a completely secure way of storing your credentials. In the step by step articles we will show you how to access, use, backup, restore and move Windows Credentials Manager vault.

Convert your files online from any format to other

Convert your files online from one format to anotherHave you ever been on a corporate computer where you do not find access to adequate software due to licensing and corporate policies ? Have you ever wanted to do a file conversion desperately, such as convert an avi file to mpg file or a dvd vob file, convert a cd song to an mp3 file etc but have been so wary to ask IT to install software on your machine because you do not have the required business case or because the delay will be too much ? No problems, today we will show you how you can convert a majority of file formats to other formats for free and without installing any software on your machine

How to find your lost phone

How to find your lost phoneYou just finished watching a movie at home and you are sleepy, you are expecting an important phone call early morning but suddenly you realize that you have lost your phone at home, you don't know where is your cellphone or handset! In the past we have showed you some cool phone phreaking tricks, such as how to spoofyour caller id when you call someone. In another cool trick and part of our Friday fun, we introduce you to another cool and helpful trick, which helps you locate your phone using the internet. This one can definitely come in handy one day.

How to protect any executable file with a password

Password protect any executable file or folderIn the past we have shown you a Windows Seven Hack where In the past we have shown you a Windows Seven Hack on how you can create a folder on your desktop and can only open it when you supply the right password. This time we will introduce something better, we will show you how you can password protect any executable exe file, document or the contents of a folder and have the folder visible to you only when you put the right password. This protection comes in addition to the local security that's offered by the Operating System such as NTFS. This can really be useful when you share a machine with family members, co-workers using the same login but need to keep some things private to yourself. In the past, chat applications, FTP applications, Excel (financial) spreadsheets and Word documents etc can all be protected against accidental deletion or use by unauthorized users.