New subscriber Edward Bell sent me a very short, but complimentary email this week.
Hello Terry, I am a new subsciber to your online program and have read your responses to the questions that were asked. I am very pleased with your seemingly patient understanding to some of us poor souls who have no clue as to what is going on with these magic boxes calles
Unfortunately, the email cut off abruptly. I though he had probably hit send, when he meant to edit the spelling of "calles" — and probably meant to end with the words "called computers."
Shortly afterwards, he followed that email with another:
Okay, here is what just happened. I was sitting at my table typing you a very complimentary email when, much to my surprise, out pops this (enter) creature and sends an in-completed email to you. Sorry about that. Now, as I was saying, you seemingly have a very patient understanding of the challenges that some of us have when it comes to tying to figure the -ins and outs- of these contraptions, and for that I thank you.
My question to you is in regard to finding what is known as "hidden files". I constantly try to find those little vermin, but just like true vermin, they stay hidden and send messages like, go to Windows so and so, or Windows this and that, to find out where you hid the files you idiot. Well, it doesn’t really say idiot, but that is exactly how I feel when I try to find the dreaded "hidden files" that I didn’t know I had hidden in the first place.
As you have probably guessed by now, I’m an older fellow with children who talk so fast that by the time they’re done explaining, you have to go lie down and take a nap because your head is spinning from trying to decipher if they really explained how a system works or if they just cursed you in speed language.
I don’t usually do this much typing when asking what is probably a very elementary question, but you don’t know my children.
I wrote back to Edward to thank him for both emails.
I also wrote that, by "hidden files," I assumed he meant the files that Microsoft’s operating system has set with an attribute flag of "Hidden." These generally are files that you aren’t meant to mess with. In some cases, Windows has set the hidden flag. In other cases, individual programs have set the hidden flag.
Some hidden files also have another attribute set — the "System" attribute flag. In this case, the flag is meant to say that they’re used by the WIndows operating system. However, any program can set (or clear) this flag also, so it’s just another way of preventing deletion (like setting the "read-only" flag).
I would think that the only "hidden files" that send messages are Windows system files and the malware files created by the "bad guys."
You can display hidden files by changing your Windows settings within Windows Explorer.