Object in a filesystem marked to not be displayed by default
"Dot file" redirects here. For the computer language which uses the .dot extension, see DOT (graph description language).
In computing, a hidden folder (sometimes hidden directory) or hidden file is a folder or file which filesystem utilities do not display by default when showing a directory listing. They are commonly used for storing user preferences or preserving the state of a utility and are frequently created implicitly by using various utilities. They are not a security mechanism because access is not restricted – usually the intent is simply to not "clutter" the display of the contents of a directory listing with files the user did not directly create.[1][2][3][4]
^"What is a hidden file?". Microsoft.com. Archived from the original on 2015-04-03.
^"Configuring X: What are all those dotfiles for anyway?". Linux Focus. March 1998. Retrieved 2013-09-08.
^"Sample .bashrc and .bash_profile Files". Linux Documentation Project.
^Subodh Soni (2001-12-01). "Understanding Linux configuration files". IBM Developer. Retrieved 2019-04-26.
and 20 Related for: Hidden file and hidden directory information
In computing, a hidden folder (sometimes hiddendirectory) or hiddenfile is a folder or file which filesystem utilities do not display by default when...
File attributes are a type of meta-data that describe and may modify how filesand/or directories in a filesystem behave. Typical file attributes may,...
based on their directory structure. Graphical file managers may support copying and moving of files through "copy and paste" and "cut and paste" respectively...
notable onion services (formerly, hidden services) accessible through the Tor anonymity network. Defunct services and those accessed by deprecated V2 addresses...
attributes (EAs) and stores them in a hiddenfile called "EA␠DATA.␠SF" in the root directory of the FAT12 or FAT16 volume. This file is indexed by two...
Legends of the Hidden Temple is an American action-adventure television game show that broadcast from 1993 to 1995 on Nickelodeon. Created by David G....
In computing, a directory structure is the way an operating system arranges files that are accessible to the user. Files are typically displayed in a hierarchical...
directory, hidden, read-only, system and volume), the address of the first cluster of the file/directory's data, the size of the file/directory, and the...
Hidden Lake Academy was a therapeutic boarding school in Dahlonega, Georgia, United States, in operation from 1994 until 2011. In 2006, it was the subject...
is a command to list computer filesanddirectories in Unix and Unix-like operating systems. It is specified by POSIX and the Single UNIX Specification...
creating or renaming such files (despite this convention being used in Unix-like systems to describe hiddenfilesanddirectories). Workarounds include appending...
steganography software tool allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data. It is not necessary...
without the need to rewrite all files. NTFS uses several files typically hidden from the user to store metadata about other files stored on the drive which...
what basic file features the file managers support. Literal - meaning the size of the directoryfile itself, not the number or sizes of the files it points...
(Extensible File Allocation Table) is a file system introduced by Microsoft in 2006 and optimized for flash memory such as USB flash drives and SD cards...
to UNIX and FAT. To facilitate cross platform compatibility, it defined a minimal set of common file attributes (directory or ordinary fileand time of...
device, device type, directory prefix, file path separator, or file type. File systems typically support organizing files into directories, also called folders...
File Explorer, previously known as Windows Explorer, is a file manager application and default desktop environment that is included with releases of the...
forensics Cryptanalysis Data remanence Disk encryption Encryption Hiddenfileandhiddendirectory Information technology audit MAC times Steganalysis United...