Hide Files v3.2 for Windows 9x/ME/NT/2K/XP
==========================================

Overview
--------

Hide Files is security program to hide any number of files or folders.

You have any files or programs that you don't want to share with other 
or they contain financial and tax information, passwords, personal 
letters and emails, private images, and other confidential or personal 
data. But typically, computer files and folders have not security 
protection so the best way to protect them is to make files or folders 
invisible for another's eyes. Hide Files makes hidden any files and 
folders (or whole Windows folder or even all computer disks).

Hide Files allows you to select any folders (and sub folders with files) 
of your choice to protect as hidden files and folders. You can select 
any folders on your computer or drag-and-drop the desired folders from 
Windows Explorer into the Hide Files window. In one mouse click the 
folders selected become invisible. Once files or folders are hidden, it 
is impossible to find them, or access and remove any file. Unhiding 
files or folders is as easy as hiding them - just one mouse click and 
they are visible and accessible to you again. If program folder or whole 
disks are hidden, itself program or Windows will continue to work 
normally. 

Hide Files is protected by a password and hotkey that you can change or 
remove at any time. You can use this security features to protect Hide 
Files from unauthorized start.


Hide files features:
--------------------

- Any number of files and folders may be hidden at the same time.
- No one but you can access your hidden files or folders.
- Program does not modify file system structure.
- Hotkey and password protection for program start.
- Stealth Mode - program itself can be hidden.
- Hide Files will hide any folders including Windows, Windows System 
  folders and Windows partition root folders without damage of 
  perational system itself (i.e. your computer will continue to work 
  normally).
- invisibility of hidden files over network.
- Locking of hidden files to prevent access to them via list of most 
  recently used files.
- Provides a high level of information security. 
- Intuitive and easy-to-use user interface.
- Full Windows platforms compatibility.
- NTFS, FAT32 and FAT file systems are supported.


System requirements
-------------------

No special requirements for hardware or software. If your computer can 
run Microsoft Windows 95/98/ME/NT/2000/XP operating systems, the Hide 
Files will run as well.


How to contact us:
------------------

You can contact us via email or fax.

Contact email address: support@spydex.com
Contact fax number: +1 (347) 823-1969

In general we prefer email communication because to accordance with our 
experience user describes his problem/request/suggestion in more 
understandable form while he composes email text. Usually we answer to 
all emails within 48 hours maximum.

Before you contact us, please do the following:

- Be sure that you're doing everything right. We all make mistakes 
  sometimes... Be attentive.
- Look at the program Help file: it may already contain an answer to your 
  question. A lot of people ask us something like "how do I:" though the 
  complete information is there.
- Visit product home page in the Internet at: http://www.spydex.com 
  It's a good chance that you'll find the newer version of program there. 
  If the serious bug has been found in the program, but the new version is 
  not ready yet, we make the hot fix for it.

But if you still have a problem with program and noting else helps, please 
contact our technical support team.

To get answer as soon as possible please inform us about the following:

- Program version (from "About" menu);
- Your order or user identification number (if you're a registered user) 
  It will help us to process your inquiry in the first place;
- Windows version (including service packs and other fixes installed), US 
  or international, OEM or not;
- Computer information: CPU type and speed, installed memory;
- Description of your problem (as much information as possible so 
  developers could reconstruct your exact situation in the lab).

