Latest Trends
Get the latest in Tech,
once a week. Free.

VR/AR
Security
Erase All Your Private and Sensitive Data In A ClickMarch 30, 2025PC Hacks / SecurityIn OnlineCmag we have spoken more than once of issues related to privacy and have also discussed different methods to protect your identity and trail anywhere on the Internet.
Throughout the entire span we’ve been here we have explained several key tricks, like How to delete all traces of your activity on a click and starting the incognito mode of Google Chrome default but that’s not all, in the Windows section you will find dozens of such useful tips.
Today we will show you another such application that will help you protect your privacy by easily removing all your private and sensitive data.
In this case, the application is the ‘Free Privacy Eraser 3.5′ and its function is to delete private data for free, as its name suggests.
Free Privacy Eraser 3.5 works in a very simple way, you just have to select the areas you want to review, press the start button and once finished press the clear button.
By this application we can eliminate many issues related to privacy, including the following:
Windows
History of opened documents
Search history
Temporary Files
Microsoft Office trace
Paint trace
Messaging Application
logs and cache different places
Etc.
Web browsers (Internet Explorer / Netscape / Firefox / Opera / Google Chrome)
Cache
Cookies
Record
Downloads
AutoComplete
Passwords
Etc.
Furthermore, the application offers the following features added:
1. Support for accessories: Amenities including over 100 accessories for popular applications such as WinRAR, WinZip, Adobe, PowerDVD, etc.
2. Custom Options: You can save cookies, make a secure erase, etc.
Certainly, Free Privacy Eraser 3.5 is one of the simplest and most complete applications that can be found at zero cost, so we recommend its use so that you can be a bit more secure than you are now.
Cleanersoft | Free Privacy Eraser 3.5 [...]
The Ultimate Cloud Data Security Mantras For Individuals and BusinessesMarch 27, 2025SecurityCan you guarantee the data you have stored on the cloud is safe? It could be a little harsh to state it this way but the point is, you can’t. Yes, this is the fact that’s actually muddling everyone from CEOs of most reputed organizations to those of small businesses and every individual storing private data on the cloud.
Don’t worry, its not really even that bad though with security teams of cloud service providers burning the candle on both ends in keeping away the attackers from your data. However, there are many protective measures you can take on your part to ensure maximum integrity and security of your data on the cloud. In this article we mention a few very important steps, we suggest you to implement at the earliest.
(If at all you are new to the entire cloud thing, here’s what you should check out first – click here)
Here are 5 Mantras on Cloud Data Security for you:
Passwords – Be More Than Careful
You must have come across this warning many a times in your daily routine. But the fact is, people don’t really learn from others mistakes. If it were the case, the stats that 90% of all the passwords can be cracked within seconds would have just been a myth. But unfortunately it’s the truth. Until and unless you create strong passwords, almost everything you put on the internet can be compromised in no time. So make sure you follow these fundamental rules while setting up passwords anywhere on the internet:
Use a strong and difficult to guess password.
Never share your passwords with strangers, and to some point even with peers.
Also set up different passwords to different accounts.
Prefer using a standard password manager, and for lot more about them, click here.
Sensitive Information – Opt storing elsewhere
This might sound crazy, but considering the safety first rule, use the virtual world for data storage as less as possible. There’s actually no other alternative to storing your data on the internet and praying for no evil eyes to target it. However the best suggestion, if you are an individual would be to store less sensitive information on the cloud and opt for other means.
In case you are a company, you could go for the hybrid cloud model and deploy other tools like, say, honeypot etc.
Encrypted Cloud Storage – For Businesses
If you are ready to invest big on cloud data security, then this option is always available for you. These encrypted cloud storage services in addition to storage and backup, also provides facilities like encryption and decryption of all the data in your local machine. This is termed as the ‘zero-knowledge’ privacy, and is the highest level of cloud security in the market.
Under this condition, no one except you, not even the personals running the cloud (service providers) can access your information. To name a few, Spideroak, Dropbox, Box are all such service providers. But the most important part lies in identifying the potency of data at hand and deciding whether or not to invest big for its security.
B1 Free Archiver – The low budget encryption
Not every business can invest that big in reaching out for encrypted cloud services, but there are a lot of other alternatives as well. B1 Free Archiver, for example does a really good job. Likewise, there are a lot of tools over there in the internet which can encrypt all your data and protect it with a password.
The additional benefit especially with B1 Free Archiver is that once encrypted, the entire data is converted into the B1 file format and any computer on which this data is being accessed needs to have B1 Free Archiver installed on it and this tool (archiver) is believed to be more safer and effective than the zip files.
Cloud Data Security – Knowledge Matters!
Believe it or not, without knowing what you are doing, just deploying a cloud model will only get you into trouble. The best way to be prepared to any of the bizarre consequences is to have complete knowledge on the cloud model (public, private or hybrid) you require, the terms of the cloud service provider and lots of analysis to maintain the perfect balance between protection and time/money.
Other than all these, with the sensitivity of data stored, physical security denying unauthorized access into the data center is also mostly suggested. Call it preparing for bad times, in addition to the above mentioned mantras make sure you read the terms and conditions of the cloud service provider carefully, believe me you don’t want to hand your most valuable data into the hands of someone playing fool with you.
[...]
Here Are Some Disadvantages With The SSL CertificateMarch 21, 2025SecurityNot many can doubt the enormous advantages of using a SSL certificate on your website. But wait; are there any disadvantages or bottlenecks in using this certificate? Let’s take a look at it.
SSL Certificate
Here Are Some Of The Disadvantages Of SSL Certificate:
Cost is an obvious disadvantage, suppliers of SSL certificates need to implement a reliable infrastructure and validate the identity of the purchaser and in all this there is an associated cost that is transferred to the final value. Obviously those suppliers of SSL certificates that are more popular considerably increase their values. The performance can further be a disadvantage with SSL certification. As the information you submit must be encrypted by the server which requires more resources than usual. Although this difference in performance can only be detected on websites with a large number of visitors and can be minimized with a special hardware.
SSL security certificate will only deliver the information safely to visitors from your site; do not expect it to defend against all the evils of the web. Well there are plenty of things for which an SSL certificate is not designed. The SSL Certificate protects only the data integrity when in transit from one system to another. If the information happens to contain a virus, SSL also transmit the virus. In other words, while SSL is excellent to protect data in motion on a network link, both the users as well as website owners should still take all necessary precautions to avoid any undesirable malware or any action within the systems themselves.
Along SSL Certificate one must add a good security system (or find a provider hosting that can guarantee it) this way you will be one step ahead of everyone in improving confidence and experience in the web of your visitors.
Remember that although there are some disadvantages of using this SSL certificate, those are very few compared to the enormous benefits that it brings. It is very important to use them on all Websites that require sending sensitive information. Proper use of an SSL Certificate helps protect your customers and you.
[...]
Web Guides
Join Our Tech Community For Free
How To
How To Use The Same Mouse And Keyboard For Multiple ComputersMarch 31, 2025PC Hacks / Web GuidesIf our work demands us to use two or more computers at the same time, alternating between the two is quite tedious and unproductive. But with Synergy 1.3.1 . We can configure them with a single mouse and keyboard, we will be able to control the same way in which we handle a single computer and two monitors extending the desktop. Simply dragging the pointer to the side of the screen jumps to the another computer.
In addition, the major amenities provided include the ability to share the clipboard, to copy and paste text and images between computers.
You can connect systems with different operating systems ( Windows, Linux and Mac ), however, the essential criteria to use Synergy is that computers must be networked.
Steps To Use The Same Mouse And Keyboard For Multiple Computers In A Network :
Step 1 : Choose the server :
We must choose a computer to convert it to a server, this will be the main component where the clients keyboard and mouse are connected. As a general rule, we will choose the one we use most frequently.
If you have activated the Windows Firewall , you must add an exception for Synergy in order to receive incoming connections, to do so, go to Control Panel / Windows Firewall , once here, inside the tab Exceptions , select Add Program and add Synergy to your list. If you use another firewall program, you must also make sure of the appropriate adjustments.
After installing Synergy on your server, execute it, and in the first screen, mark the option Share this computer’s keyboard and mouse (server) , and click the button config , because all configuration parameters are set on the server.
Step 2 : Add your screens :
The first configuration step is to add all the computers we want. On this sense, we must know the name of each computer, if you do not know, you can consult or change in Control Panel / System , the tab name equipment.
Once you have taken note of the names, just press the + key to display a screen ” Enter The Name Of The First Computer “. Then click on OK . Repeat this process for all computers you wish to add.
It is important to note at the time of the connection, if you notice some strange behavior with keys Caps Lock , Num Lock and Scroll Lock , we return to these options and check the appropriate boxes to enable bidirectional communication.
Step 3 : Create links:
After completing the process of adding the systems, it’s time to create focal points to jump from one screen to another. The most common configuration is to have two devices side by side, so that rising from the right of the left-most, enter the second and vice versa. However, we can place more than two and configure the way that suits us.
At the bottom menu that we saw in the previous step, in the first dropdown, choose the name of the screen to the right and select left side go to our left monitor. Percentages also see where we can adjust the sizes of the linked areas. After adjusting the parameters, just press + .
As expected, we perform the same action but contrary to our other display and thus able to move the mouse in both directions. Once configuration is complete, proceed to save it by clicking OK and returning to the main screen. We are ready to start our server, so you will press Start and Synergy will minimize to the system tray being pending connections.
Step 4 : Connect customers :
With our server running it’s time to connect the clients. Now Install and run this application in the computer you want to connect. Now on the main screen, select the option Use another computer’s shared keyboard and mouse (client) , write down the name of the server and press the button Start .
If everything went correctly, Synergy will be minimized and you can see its icon in the system tray with a yellow beam. From this moment, we can move the mouse connected to the server to see how it moves from one screen to another. In the event that has not been able to connect a console indicating the error appears and you must therefore review the configuration and verify that the equipment is properly connected to the local network.
Step 5 : Set and forget :
Since we will only use a keyboard and mouse, we are concerned that whenever computers are turned ON, they are automatically connected together without having to launch Synergy in each of them. On the Home screen, press the button autostart , now a dialogue with lots of text, but only two buttons will be displayed, the first install this feature for the current user and the right will do the same with all users of the computer.
Hardware or software?
We face an interesting case because using a program we can emulate the same work as would a physical device: A KVM switch (Acronym for Keyboard Video Mouse ), a device that allows us to control multiple computers using a single keyboard, monitor and mouse. These devices are connected to the corresponding ports on the CPU and allow us to switch between them by a switch without changing the peripheral hand.
Therefore, we could consider a virtual KVM Synergy, which offers some improvements such as: share clipboard, create the illusion of working with a single desk and the not inconsiderable advantage of saving a bunch of cables. However, you can use a physical KVM, if we want to use one screen to control multiple PCs or if they are not on the same network. [...]
Erase All Your Private and Sensitive Data In A ClickMarch 30, 2025PC Hacks / SecurityIn OnlineCmag we have spoken more than once of issues related to privacy and have also discussed different methods to protect your identity and trail anywhere on the Internet.
Throughout the entire span we’ve been here we have explained several key tricks, like How to delete all traces of your activity on a click and starting the incognito mode of Google Chrome default but that’s not all, in the Windows section you will find dozens of such useful tips.
Today we will show you another such application that will help you protect your privacy by easily removing all your private and sensitive data.
In this case, the application is the ‘Free Privacy Eraser 3.5′ and its function is to delete private data for free, as its name suggests.
Free Privacy Eraser 3.5 works in a very simple way, you just have to select the areas you want to review, press the start button and once finished press the clear button.
By this application we can eliminate many issues related to privacy, including the following:
Windows
History of opened documents
Search history
Temporary Files
Microsoft Office trace
Paint trace
Messaging Application
logs and cache different places
Etc.
Web browsers (Internet Explorer / Netscape / Firefox / Opera / Google Chrome)
Cache
Cookies
Record
Downloads
AutoComplete
Passwords
Etc.
Furthermore, the application offers the following features added:
1. Support for accessories: Amenities including over 100 accessories for popular applications such as WinRAR, WinZip, Adobe, PowerDVD, etc.
2. Custom Options: You can save cookies, make a secure erase, etc.
Certainly, Free Privacy Eraser 3.5 is one of the simplest and most complete applications that can be found at zero cost, so we recommend its use so that you can be a bit more secure than you are now.
Cleanersoft | Free Privacy Eraser 3.5 [...]
How To Recover Files From Your SD Card Memory ?March 29, 2025PC HacksOne of the most feared threat from home PC users to IT companies is the possibility of losing data (Information) which is continuously being safeguarded using the best lines of defense.
Although every day stronger and more durable devices are being built, there could always be a new problem that could delete the data from the disk.
The problem is compounded if we speak of a SD card of our camera or our phones. For example, losing all the pictures you just put all the time and effort to click would be a problem, right?
In this article we will teach you how to use an application that can often help you recover the lost information. It is Photorec, a multi-platform application that you can use in any of the cases involving data loss.
Easy Way To Remove Password From A PDF File In 2 Minutes
Have you downloaded a PDF file with password? Do not worry, in this article we are going to show you how to easily remove password from PDF file with these
Read More
Steps To Recover Files From Your SD Card Or Pen Drive
The great advantage of this application is looking for a particular file type from 390 possibilities i.e you can directly search by using the extension like ZIPs, JPEGs, MP3s, DOCs, XLSXs, PSDs and more.
The only fault we could find in this application is that it does not have a graphical interface, but that’s no problem if you follow the tutorial to the letter.
Download the application, it is an application that requires no installation and is completely portable.
Connect the SD card or Pen Drive or disk from which you want to recover the data and run the application. For using this application you will be need administrative rights.
Now choose a secure password.
Now choose the disk to recover, it will know by the ability of the device.
Now you will be asked to select the partition , if you have more than one partition at this point it will show all available partitions, in case if you are using only one partition it will show only one and you must choose.
The next option is focused on the type of system you are using on your disk if the disk contains a Linux system select the first option, otherwise select Other .
Now you will be asked to specify where files are to be searched , this option is somewhat useless because obviously not going to be in the free part, so select the option Whole .
Now is the time to say where we want the recovered files are to be saved. You only have to browse to where we want to do this and press the C key to set the folder.
Finally, after this the program will start the process and only playing wait for this end. When finished, we can find all files that have been able to recover within the destination folder you have selected.
Your Thoughts
Have you used Photorec before? If so do share with us your experiences on the product. We are also ready to learn and share your knowledge among our users as well. Thank You! [...]