Currently Browsing


As power users, we love control. More specifically, we love knowing what happens where, when and how. While utilities to monitor your CPU usage and other metrics are fairly easily available, your network is often ignored since it’s a lot more, well, nerdy.

Today, I am going to give you a mini-review of Wireshark, an excellent network utility, and a little guide through running the app on your computer.


Have you ever been stuck up with deleting, moving or renaming a file in Windows with no real clue except weird error messages? Most of us have come across this problem.

You usually get an error that reads “Cannot perform the operation. File access denied” if you try to delete a file and that’s it. If you’re like me, this will absolutely drive you up the wall. “How dare the OS not listen to what I’m saying!”, you’ll fume. Surely, there must be an easy way!

Read on to find out how to solve this tiny, but oh so annoying issue.


Do you know the feeling you get when you lose critically important data? Yeah, that sinking one. I went through the same ordeal a couple of days back and learned the hard way that not even cloud storage services are safe from unwanted data access and data theft.

Utterly flabbergasted at the loss of data, I set out to look for something which would help me keep my data safe, even over a cloud storage network and found BoxCryptor. Is it any good? Read on to find out…


People go the extra mile when it comes to protecting their physical assets however worthless and depreciated they might be. In my opinion, there shouldn’t be any difference when it comes to securing digital assets too. A lost hard disk or a thumb drive can have more compromising data than you might expect. That’s why prevention is always better.

The safest and simplest way to secure your data is encrypting it. While it might sound complex, in practice encryption cannot be any more simpler. Just create a sensible master password or a key file and there are a bunch of commercial and open source apps to do all the heavy lifting. Today, let us see how to use the crowd favorite TrueCrypt to lock down all our data.

Page 1 of 7