By point-Blank Software Productions
http://www.PointBlankSoftware.com
The following are features enabled in the paid version, but disabled in the free version:
Ghost is ready to use as soon as it's downloaded. A Help window appears when you open the program, and the content changes to provide basic information on each program function as you select it. If you need more detailed information about any aspect of the program, you can open the user's manual from the Help menu. The manual includes a "Tips and Tricks" section that is worth reading before you use the program.
Before you use Ghost to hide important files or folders, do a practice run with the test file and folder that come with the program. To render a file invisible, select "Protect items" from the File menu. In the dialogue box, locate the Extras folder within the Ghost program folder. Select the Test Folder and/or the Test File, and click the Protect button. If the Extras Folder is visible on your desktop, you'll see the Test File and/or Test Folder disappear within a few seconds.
Before you practice the restore function, go back to the Extras folder and locate the three Sherlock search files, labeled "Folders," Invisible," and "Visible." (These files include small magnifying glass icons similar to Sherlock icon located in the Apple Menu Items folder in your System folder.) Use the "Invisible" search file and it will locate any individual files that you've protected. If you lose track of the location of an invisible file, this feature will enable you to find it.
To remove protection, select "Restore Items" from the File menu. It will open a dialogue box; navigate to the item you want to restore, and select it. If the folder in which the file is located is visible on your desktop, the previously invisible item will reappear within a few seconds.
Ghost may be especially useful if you're using a pre-OS 9 operating system, which does not include the Apple File Security. If you're using OS 9 (or OS X since it requires that you also install OS 9), Ghost may be redundant since you already have a program that will encrypt any file on your computer.
Back to Reviews | Back to Guide