Category: Security

November 26, 2010 /

There are several ways to temporarily lock your computer when are away from your desk. One option is to use the native desktop locking feature in Windows � the keyboard hotkey Win+L. Pressing the keys Win and L together, at any time, locks the computer and takes it back to the logon screen. The computer cannot be unlocked without entering the correct user password. Then there are third party tools, many of which were featured previously on Instant Fundas. Let us recall them. 1. Mouse Lock is a free, open source utility that can dim the desktop and lock the cursor into…

Read the Post5 ways to temporarily lock your mouse, keyboard and computer

November 14, 2010 /

Facebook is a great platform for networking. You can reconnect with old friends from school or stay in touch with family and friends who live far away. Facebook makes it easy to find and get in touch with people. However, this feature can haunt you when someone you wish you had never met won�t stop messaging and harassing you. If your stalker�s prime route of contact is through Facebook, there are several things you can do to block that Facebook stalker and make it difficult for them to contact you. This article will guide you through the options you have.…

Read the Post5 Ways You Can Block A Facebook Stalker

October 18, 2010 /

Locking our computer definitely comes into play when you are not the only user of it. There are many ways to lock our windows operating system. Usually in most of the ways, for locking windows you need to have a password entered for it. And again you need to type in a password in order to unlock windows. These days USB Flash drives are so common and almost all the computer users have one with them. So, how about making use of these USB flash drives to lock your windows computer?Predator is a small windows utility that will help you to lock the current windows session…

Read the PostHow To Lock Windows Using USB Flash Drives

October 6, 2010 /

Just remembered a trick to make a folder hidden in windows and posting it here…Here’s the trick: In windows even if we make a folder properties hidden it will be shown when we use the option �search for hidden files and folder� while searching a file.But here is a trick that really make the folder invisible.So here�s how you do it. Right click the place where you want the folder to be created and select create a new folder. Right click the newly created folder and select rename. Now clear the file name.But windows tells you that you cant create a…

Read the PostMake a Folder Compelety Invisible in Windows

October 6, 2010 /

If you are into registering with not-so popular websites, you are most likely to join the list of spam mails. You are getting one step ahead in receiving spam emails. Registering with unknown websites can be avoided to some extend but some times we get compelled to do so. But if you have a temporary or disposable email address then you can be free from those spams getting into your inbox. So here is how you can easily get a temporary or disposable email address. There are quite a few services that provides disposable email addresses. A service called 10MinuteMail.com is a good one to consider. It gives you a…

Read the PostHow To Get Temporary/Disposable Email Address ?

October 6, 2010 /

For some reason if you don’t remember the password used to login to your google accounts or any other, and want to get back the hidden password, there is an easy way to view those passwords hidden behind the asterisk (*) characters. You might have given the option to save the password for that particular site when your browser asked, the first time while entering the user name and password while logging in. The browser will automatically display the password if you have saved it before and you only need to press the login button. But if you need to know / don’t…

Read the PostA Simple Way To See Passwords Hidden Behind Asterisks

September 26, 2010 /

You’ve set up your wireless network. You’ve been good, too – you gave your router a unique ID that won’t be easily mixed up with other wireless routers and you have secured the network with a password so not just any passer-by can piggyback off your network as a means of downloading South Park episodes. You don’t have to worry about hackers now, right? Well, not so fast. Although you’ve taken the basic steps required you still need to be aware of some hacking methods that can be used to gain access to your network despite the safeguards you have in…

Read the PostHow People Are Hacking Wireless Networks & How To Protect Yourself