Submit portable freeware that you find here. It helps if you include information like description, extraction instruction, Unicode support, whether it writes to the registry, and so on.
Do you remember Free Hide Folder?
Well I'm using it, and I think that there are some TPFC users who are looking for an app like this one for the function that it does even if its target is to deal with the system itself...
I'm using portable apps to: 1. keep my system clean 2. to be portable when I need to (usb stick) 3. I installed on my laptop IrfanView, VideoLAN and even Firefox* because I can get a full control on my settings e.g. BackUp, Reset, Testing... you name it! and if I did s.th. wrong! it's easy to fix 4. maybe I have more other purpose which I can't think of at the moment
------------------------------------ * the major reason is the profile management switch
Network Stumbler Writes settings to: Windows registry. But given the nature of the application, I think it can be accepted as portable.
SmartSniff Writes settings to: Since release 1.35: application folder. Previous releases: Windows registry, but given the nature of the application, I think it can be accepted as portable.
Mail PassView Writes settings to: Windows registry. But given the nature of the application, I think it can be accepted as portable.
PicoZip Recovery Tool Writes settings to: Windows registry. But given the nature of the application, I think it can be accepted as portable.
GSpot Writes settings to: Windows registry. I am accepting it as portable on the assumption that it will only be used occasionally to troubleshoot codec problems, so portable settings is that important.
PocketDivXEncoder Writes settings to: None. Note that registry entries are created/updated for various application settings, but the program always start with the default settings for some reason. So if you are concerned with "stealth" i.e. not leaving any trace on the host machine, this program may not be for you.
Riva FLV Encoder Writes settings to: Windows registry. But it only writes the language setting. Other settings are not saved.
WinDV Writes settings to: Windows registry. But given the nature of the application, I think it can be accepted as portable.
mp4UI Writes settings to: Windows registry. But given the nature of the application, I think it can be accepted as portable.
I'm not so sure what does Andrew mean by nature (maybe the purpose of the app)
AlephX wrote:I tested it with regshot. It does not write "settings" into the registry, but it leaves traces of the crypted foder name, and of the password ("pippo") which is used:
AlephX wrote:I think that it can be accepted as portable app only if intended to be used only on fixed HD (like a parasite!), but can´t work on portable devices (I guess).
We need to add this note!
AlephX wrote:The second value is the password, I guess. I think that it is easily "brekable"... and the presence of the hidden folder is visible in the registry.
You're right!! I placed a shortcut of my Launchy v1.25 in Start > Programs > StartUp and even when the folders are hidden Launchy can still detect the files in'em (Launchy is located in a hidden folder as well)
Yes, now I remember. The fact is that it is difficult to consider this application as used on non-regular basis... I realized that when already writing the record in TPFC database.
I like the application.
Indeed it can be a very interesting program to use on a single PC (running it from the private USB pen!) like you do
It is not portable: if I want to hide a folder on my USB stick, I can not use it everywhere... unless I use JauntPE (Maybe).
Another issue: it requires a registration code and propts the user for it... someone can really get angry because that.
So, despite my opinion, I would guess that it cannot be considered as portable (even if I would use it anyway!)
This application is not portable. The changes it makes in the registry are fundamental to its operation.
While it can hide files from Windows Explorer and applications which repackage it, the files are not hidden from software which roots through the file system on its own. It's a classic example of "security through obscurity".