How to Make Your Own Folder Locking Software For Free

Why download others is Folder locking software ? When you could make your software that can lock folder with the countersign and that too without spell a single piece of code . In this clause , I will show how you’re able to make our folder locking software program . you may put all your personal stuff in this leaflet that you do not require others to peek in , and then lock the folder with password ....

August 3, 2012 · 2 min · 422 words · Johnny Preston

How To Mess with Someone’s .bashrc file

So , this Emily Price Post is basically written for those malign minds Linux users who like to mess up around with their friend ’s laptop and make their animation a living hell ! ! Now , we got this data file called the .bashrc data file which is fundamentally a shell handwriting which runs every clip you start your depot . And thanks to linux which gives us the freedom to qualify it ( the ....

July 19, 2012 · 2 min · 394 words · Krystal Gibbs

How to access blocked sites using ultrasurf without proxy

If your creation is too smart for proxy sites just like mine , then the only thing which works is Ultrasurf . Most of the college and berth blocked Facebook , YouTube , torrents and pornographic websites generally so that students do n’t waste their fourth dimension . But In some nation , they halt almost everything that is a threat to their culture . But what should one do , when there is a genuine need to open up these blocked websites ....

July 18, 2012 · 4 min · 704 words · Kristen Castro

10 Things You Should Never Do On Facebook

The never - ending debate of what ’s untimely and what ’s not haywire ( since nobody care about what ’s right ) keep on to baffle the realms of Facebook . Nobody cares if you ’re a close , toothless bastard in real life but if you ’ve got ta Bradley Cooper display photograph , more than 2100 friends and you post peculiar stuff , you ’re the lord ....

July 12, 2012 · 5 min · 1024 words · Philip Johnson

How to Boost your Laptop Speed in 5 Simple Steps

Since you are reading this clause , I imagine you are also foiled with laptop computer swiftness . After a few months I work my laptop computer I have noticed there was a significant simplification in the processing pep pill of my laptop . I was aware of the fact that fastness decreases as you adulterate young software and fill your hard ride . In this compositor’s case , it was more than just than that , My laptop was taking around the 30 to bang , programs stop responding if I opened more than 2 - 3 of them and so on ....

July 11, 2012 · 4 min · 851 words · Andrew Stafford

How to get back permanently deleted files from computer

Since you are read this , the chances are that you may have come across a situation when you had unintentionally deleted single file for good ( using displacement + delete ) or empty your recycle bin and later on when you realized your mistake and hoped if there is / was to get back for good deleted files from the computer . Well , you are in circumstances . You will be beaming to screw that you may easily recollect your edit data file even though you have for good erase it ....

July 9, 2012 · 3 min · 476 words · Jose Jackson

Difference between Root Superuser on Ubuntu

You might have this question at the back of your brain that WTH ! is the difference of opinion between root and superuser ? And how ’re their commands different . substance abuser account and sudo ? Here are some tips that will facilitate you out , So , what fall out when you install Ubuntu on your organization is that you are prompted to make a user bill ....

July 8, 2012 · 4 min · 800 words · Jack Cowan

What’s a Good Password And How To Create One

In today ’s humanity , everything is going digitals whether it ’s your camber , your shopping experience , even your supporter on societal networking websites . But all these conveniences of getting thing done with few clink come with a price . And In this compositor’s case , the cost that we have to compensate is oursecurity . today it ’s rough-cut for hackers to steal information by pretend your password ....

April 18, 2012 · 4 min · 824 words · Melinda Wright