File Encryption Search Results

How To: Send and receive files via Bluetooth on a BlackBerry

Can't make it to a computer to open up some important documents? Fortunately, the BlackBerry is basically a mini-computer that can get those open for you. BlackBerry can be a little tricky while trying to send and receive files through Bluetooth, but with the right help, you can get the hang of it. This video cell phone tutorial shows how to do it step by step.

How To: Build web services with MapForce

This tutorial shows you how to build web services with MapForce. Load an existing WSDL file and build a complete web service by retrieving data from databases or XML files and using a visual function builder. It's easy to build web services in MapForce as this tutorial shows.

How To: Protect private files from prying eyes with TrueCrypt

Check out this video tutorial to see how to keep your private files private, even if you have to email them to yourself at your office? TrueCrypt, an open source piece of software, lets you encrypt your files so they remain accessible only to you. This works on any platform; Windows, Linux, or Mac. So, watch this video to see the TrueCrypt download process, how to install it, and how to create an encrypted volume on your hard drive.

How To: How to get NES on your iPhone/iPod Touch

This actually works and you don't need wifi or you don't have to put a source in your iPhone/iPod Touch that doesn't work. You get 960 NES ROMs. As long as you follow directions you it should work perfectly. I will also have a tutorial up soon on how to use the program i mentioned in the video called Limewire on how to download various things. And i should will have a tutorial on how to get SNES working on iPhone/iTouch very soon. Warning: Limewire can give you a virus, so be careful when dow...

How To: Format a CSS website

Being organized and using good formatting in your CSS files can save you lots of time and frustration during your development process and especially during troubleshooting. The multi-line format makes it easy to browse attributes but makes your file vertically very long. The single-line format keeps your file vertically short which is nice for browsing selectors, but it's harder to browse attributes. You can also choose how you want to group your CSS website statements. Do you do it by sectio...

How To: Organize the OS X Finder

John Hendron demonstrates keyboard shortcuts and the "Sidebar" in Mac OS X Tiger with tips on keeping files organized. This 7.5 minute video includes how to "tell where you are" in the file system, how to set desktop preferences, and how to customize the toolbar in Finder windows. John is an instructional technologist for Goochland County Public Schools (VA).

How To: Flatten transparency in PDFs using Acrobat

The introduction of transparency has been quite controversial in print production over the past few years, though the fact is that for most transparency in Adobe files works just fine. However, those of us out there with older RIPs may have issues printing transparency. In this video you'll see how to flatten transparency in your PDF files before you ever hit the Print command.

How To: Get started with Adobe ImageReady

Many Photoshop users have no idea ImageReady is there or let alone what it's used for. In this video we will take a look at how to create web rollovers from a Photoshop file. ImageReady is a web optimization tool as well as a good tool for creating animations from your layered Photoshop files.

How To: Use Wordle to create word clouds

This video tutorial belongs to the Computers & Programming category which is going to show you how to use Wordle to create word clouds. Go to Wordle and click on the 'create your own' link. In the first box, type in your text, and in the second box enter the URL of any blog, blog feed or any other web page that has an Atom or RSS feed. In the 3rd box enter your del.icio.us username, if you have one. After typing in, hit 'go' and you get your Wordle file with the words written in different sty...

How To: Clear up office clutter

It's easy to find yourself drowning in a pile of papers and nick-nacks if you're not armed with a good organization system. By taking the time to set up a system where everything is condensed and has a place you'll find it much easier to keep it that way.

How To: Save Your Most Important Memories Forever with Secure Cloud Storage

Losing your important data can be more painful than losing the hardware the data was stored on. Precious memories, files you don't often access but always want to have, there's so much you store on impermanent devices that you can't live without. Backing up your information to a secure, cloud-based location is the best way to stave off disaster here. Polar Backup Unlimited Cloud Backup Storage will give you an unlimited amount of cloud storage while making the process super easy.

How To: The Easy Way to Upload Files Anonymously from Your iPhone So They Can't Be Traced Back to You

If you need to share something online but don't want your personal information attached to the file, use an anonymous file hosting site. By uploading files anonymously, you keep your IP address safe and won't need to create any kind of account that could provide further logging. You can do this in a web browser, but it's much easier to do using a shortcut on your iPhone.

How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra

Everybody knows not to store sensitive information in unencrypted files, right? PDFs and ZIP files can often contain a treasure trove of information, such as network diagrams, IP addresses, and login credentials. Sometimes, even certain files that are encrypted aren't safe from attackers. That's where Zydra comes in — a tool for cracking RAR files, ZIP files, PDF files, and Linux shadow files.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.