Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

DropIt

DropIt

After the usual installation process, and after launch, there will be a "DropIt zone" on your desktop, in the form of an icon that looks like the usual shortcuts on the desktop. To begin with, you will need to configure actions, which the program calls "patterns".

First select the filtering method, for example, by file extension or file or folder name. Then, choose one of the seven available actions, from copy, to scroll, delete, compress, and so on. and finally, select the desired destination.

DropIt

This way you can create a very detailed set of rules so that, for example, if the dragged file is JPG, PNG, GIF, or BMP, it automatically goes to the "My Pictures" folder, while all Word .DOC files of a certain name are transferred to the folder "for" work".

It is worth mentioning the possibility of creating multiple profiles, each of which can contain separate sets of defined rules.

DropIt also can archive content, where you can choose the archive format, as well as the level and method of compression, while encryption and password protection are also available.

The use-value of such a program largely depends on how well you adapt it to sets of rules.

Download

Source: Interface.tv

Comments

Popular this month

Chrome crashed in Pwn2Own

Google's Chrome browser crashed during the Pwn2Own competition. Yesterday, the first of three days of the competition was held. Although Pwn2Own has been untouchable in the past two years , the French team, Vupen, was the first to show the existence of two weak points within this browser when it runs on the Windows 7 operating system.

Mobile Browsers

The Internet on mobile devices is becoming more popular and has more and more users. As mobile internet expands, so do mobile browsers. Although the devices themselves already have built-in basic internet browsers, new browsers are constantly appearing. The reason is that each of the programs brings something new and useful. For example, Opera Mini is most popular on older phone models that use Java applications, while on Android platforms Chrome , Firefox ,  Dolphin , and xScope are more represented.

Nintendo server hacked!

Problems with hackers are no longer just PlayStation 3 exclusives. Nintendo confirmed yesterday that their Nintendo America server was hacked but that no information or data was compromised during the attack.

The first Lion update

As part of a software update released yesterday, Apple released OS X 10.7.1 , the first update for their operating system that carries patches for several security vulnerabilities and bugs that accompanied the initial release.

Sony Xperia Z5 Dual Sim review [video + images]

The Xperia Z5 is another great flagship model from the Z family of devices that Sony launched in September this year, about a month ago. The case design is great . The side edges are slightly curved to make the phone fit better in the hand, and the back of the device has a fine finish so there are no glare and fingerprints.