Offtopic: I've completed my new Blogger hack. I'm not sure if anyone's done it before since it's quite simple, but I'll guess I'll know when I post it. Oh and happy Thanksgiving if you celebrate it!
PipeBytesWant a fuss-free way to share a couple of files with your not-so-computer-savvy friends and vice versa? Just stuff your internet pipes with PipeBytes. Whether you're the sender or receiver, with PipeBytes all you need is a browser and you're ready to begin transferring files to anyone in the world. As you upload your files, your friends can simply start downloading them from you without waiting for your upload to complete.
Unfortunately, while PipeBytes is incredibly simple to use, it does have some severe limitations. The biggest drawback is the capping of the upload speed to 128kbps for free users. Transferring a 21MB file to myself took approximately 25 min, which is a bit too long for my liking.
Sending files above 5MB is probably out of the question with PipeBytes as it doesn't support resuming either. If you're hoping to send the same file to multiple users, you'll have to repeat the upload process for each user. PipeBytes is supported by advertising, but don't worry too much about that. You'll probably won't even notice the Google ads while you're enjoying the YouTube videos.
Pipebytes is great for the occasional file transfer, but for heavy duty file sharing, I suggest looking elsewhere for solutions.
Afraid that the family computer will be taken over by rogue malware this holiday season? You could setup limited user accounts for your family members or you could go one step further and install Trust-No-Exe as well.
Trust-No-Exe works by blocking every type of executable file, including .exe, .scr, .com, .dll and more, not on the access list from running. According to the site, Trust-No-Exe monitors if a file is loaded as a process or thread by the operating system, which means that a simple file rename will not be able to trick Trust-No-Exe.
When I gave Trust-No-Exe a test run, I noticed that even Administrators are not spared the "Access Denied" dialog box. This comes in handy if you accidentally execute a malicious file. (Yes, it happens to the best of us.) The access list in Trust-No-Exe works as a whitelist, while the deny list is a blacklist. This means every program not on the access list will be blocked from running, while those on the deny list will also trigger the warning.
Trust-No-Exe comes with features for easy deployment on multiple computers and the warning message can be also be customized. Trust-No-Exe runs on Windows NT/2000/XP.
Don't trust anyone, except... me. :P